Secure Broadcasting
نویسندگان
چکیده
Wyner’s wiretap channel is extended to parallel broadcast channels and fading channels with multiple receivers. In the first part of the paper, we consider the setup of parallel broadcast channels with one sender, multiple intended receivers, and one eavesdropper. We study the situations where the sender broadcasts either a common message or independent messages to the intended receivers. We derive upper and lower bounds on the common-messagesecrecy capacity, which coincide when the users are reversely degraded. For the case of independent messages we establish the secrecy sum-capacity when the users are reversely degraded. In the second part of the paper we apply our results to fading channels: perfect channel state information of all intended receivers is known globally, whereas the eavesdropper channel is known only to her. For the common message case, a somewhat surprising result is proven: a positive rate can be achieved independently of the number of intended receivers. For independent messages, an opportunistic transmission scheme is presented that achieves the secrecy sum-capacity in the limit of large number of receivers. Our results are stated for a fast fading channel model. Extensions to the block fading model are also discussed. Index Terms Wiretap channel, information theoretic secrecy, confidential messages, parallel channels, fading channels, multiuser diversity, multicasting
منابع مشابه
Secure broadcasting in large networks
It is common that users or hosts in a large network are partitioned and organized as a hierarchical tree where children of the same parent form a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals. Only legal receiving principals can decrypt the message, and illegal receiving principals cannot acquire an...
متن کاملCryptanalysis of Improved Liaw's Broadcasting Cryptosystem
A secure broadcasting cryptosystem must provide a secure communication channel from a sender to a group of legal or authorized receivers. Many of the proposed systems [3-5] require a large number of broadcast messages and present a number of problems. Moreover, Liaw [2] proposed a secure broadcasting scheme with fewer broadcasting messages, which allows easy insertion of new users into the acti...
متن کاملBroadcasting Session Keys
This paper considers true broadcast systems for the secure communication of session keys. These are schemes that provide for parallel rather than serial construction of broadcast messages, while avoiding selective broadcasting. We improve upon a model implemented with Shamir's threshold scheme, and use information theoretic techniques to show that this enhancement is optimal. We then present a ...
متن کاملIdentity-Based Broadcasting
In this paper, we introduce a new concept called “IdentityBased Broadcasting Encryption” (IBBE), which can be applied to dynamic key management in secure broadcasting. Based on this new concept, in the proposed system a broadcaster can dynamically add or remove a user to or from the receiver group without any involvement of users. We classify our systems into three different scenarios and give ...
متن کاملSWFP: Secure Web Feed Protocol
SWFP ensures the secure broadcasting of web feeds’ content over a local network or the Internet. The protocol is built to ensure a secure channel to enterprises that broadcast news and information to their employees through web feeds. The protocol also ensures the legitimacy of the readers.
متن کاملNCTS-DCR: Node Centric Trust based Secure Dynamic Source Routing Protocol
An ad hoc network comprises of few particular connections which collectively collaborate to assist other connections to converse with its associates with the assistance of direct wireless broadcasting. Routing issue in ad hoc broadcasting revised routing problem in a unfavorable situations taking into assumption a secure surrounding. A Node Centric Trust based Secure Dynamic Source Routing (NCT...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/cs/0702093 شماره
صفحات -
تاریخ انتشار 2007