Multipath Private Communication: An Information Theoretic Approach

نویسندگان

  • Hadi Ahmadi
  • Reihaneh Safavi-Naini
چکیده

Sending private messages over communication environments under surveillance is a very important challenge in communication security and has attracted a lot of attention from cryptographers through time. We believe that resources other than cryptographic keys can be used to provide communication privacy. We consider private message transmission (PMT) in an abstract multipath communication setting between two communicants, Alice and Bob, in the presence of a third-party eavesdropper, Eve. Alice and Bob have no a priori shared keys and furthermore, Eve is computationally unbounded. There are a total of n paths, and the three parties can have simultaneous access to at most ta, tb, and te paths. The parties can reselect their accessed paths after every λ bits of communication over a path. We study two types of perfect (P)-PMT and asymptotically-perfect (AP)-PMT protocols. The former has zero tolerance of transmission error and leakage, whereas the latter allows for positive error and leakage, which tend to zero as the message length increases. We derive the necessary and sufficient conditions (based on the above parameters) under which P-PMT and AP-PMT are possible. We also introduce explicit P-PMT and APPMT protocol constructions. Our results show that AP-PMT protocols attain much higher information rates than P-PMT ones. Interestingly, Alice and Bob can achieve AP-PMT even in unfortunate conditions that they have the least connectivity (ta = tb = 1) and Eve may access all but one paths (te = n − 1). It remains however an open question whether the derived rates can be improved by more sophisticated AP-PMT protocols. We study applications of our results to private communication over the real-life scenarios of multiplefrequency links and multiple-route networks. We show practical examples of such scenarios that can be abstracted by the multipath setting: Our results prove the possibility of keyless information-theoretic private message transmission at rates 17% and 20% for the two example scenarios, respectively. We discuss open problems and future work at the end.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Connectivity of ad hoc wireless networks: an alternative to graph-theoretic approaches

Connectivity in wireless ad hoc and sensor networks is typically analyzed using a graph-theoretic approach. In this paper, we investigate an alternative communication-theoretic approach for determining the minimum transmit power required for achieving connectivity. Our results show that, if there is significant multipath fading and/or multiple access interference in the network, then graph-theo...

متن کامل

Improved Upper Bounds on Information-theoretic Private Information Retrieval

Private Information Retrieval (PIR) schemes allow a user to retrieve the i-th bit of an n-bit database x, replicated in k servers, while keeping the value of i private from each server. A t-private PIR scheme protects the user's privacy from any collusion of up to t servers. The main cost measure for such schemes is their communication complexity. We introduce a new technique for the constructi...

متن کامل

Fading Channels: Information-Theoretic and Communication Aspects

In this paper we review the most peculiar and interesting information-theoretic and communications features of fading channels. We first describe the statistical models of fading channels which are frequently used in the analysis and design of communication systems. Next, we focus on the information theory of fading channels, by emphasizing capacity as the most important performance measure. Bo...

متن کامل

A T-private K-database Private Information Retrieval Scheme

A private information retrieval scheme enables a user to privately recover an item from a public accessible database. In this paper we present a private information retrieval scheme for k repli-cated databases. The scheme is information-theoretically secure against coalitions of databases of size t k ? 1. It improves the communication complexity of the scheme described in 12] for coalitions of ...

متن کامل

Fading Channels: Information-Theoretic and Communications Aspects - Information Theory, IEEE Transactions on

In this paper we review the most peculiar and interesting information-theoretic and communications features of fading channels. We first describe the statistical models of fading channels which are frequently used in the analysis and design of communication systems. Next, we focus on the information theory of fading channels, by emphasizing capacity as the most important performance measure. Bo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1401.3659  شماره 

صفحات  -

تاریخ انتشار 2014