The MAC Resolvability Region, Semantic Security and Its Operational Implications
نویسندگان
چکیده
Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel (MAC) from the perspective of resolvability. We then refine the approach in order to obtain some novel results on the second-order achievable rates. Establishing a conceptually simple converse proof for resolvability over the memoryless MAC, which relies on uniform continuity of Shannon’s entropy with respect to the variational distance, we characterize the resolvability region. In a discussion of the operational meaning of the information theoretic concept of semantic security from the point of view of Ahlswede’s General Theory of Information Transfer, we show some interesting implications on the resilience against a wide-ranging class of attacks even if no assumption can be made about the distributions of the transmitted messages. We then give details on how the resolvability results can be used to construct a wiretap code that achieves semantic security.
منابع مشابه
Building a Persian Gulf Missile Defense Shield and its Impact on Regional Security: (2001-2017)
The gradual development of the US missile defense shield from Europe to the Persian Gulf region over the past decade and the deployment of radar components and defenses of this project, both in the Persian Gulf region and in its floating zone, have plenty implications for regional and international systems and has aggravated the fragile security of the Persian Gulf region. Some issues such as t...
متن کاملOuter Bound of the Capacity Region for Identification via Multiple Access Channels
Abstract—In this paper we consider the identification (ID) via multiple access channels (MACs). In the general MAC the ID capacity region includes the ordinary transmission (TR) capacity region. In this paper we discuss the converse coding theorem. We estimate two types of error probabilities of identification for rates outside capacity region, deriving some function which serves as a lower bou...
متن کاملSEIMCHA: a new semantic image CAPTCHA using geometric transformations
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملSecrecy from Resolvability
We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the notion of resolvability. Instead of considering capacity-based constructions, which associate to each message a sub-code that operates just below the capacity of the eavesdropper’s channel, we consider resolvability-based constructions, which associate to each message...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1710.02342 شماره
صفحات -
تاریخ انتشار 2017