Strong Secrecy for Wireless Channels (Invited Talk)
It is widely accepted by the information security community that a secrecy criterion based solely on minimizing the rate at which an eavesdropper extracts bits from a block of noisy channel outputs is too weak a concept to guarantee the confidentiality of the protected data. Even if this rate goes to zero asymptotically (i.e. for sufficiently large codeword length), vital information bits can easily be leaked to an illegitimate receiver. In contrast, many of the recent results in information-theoretic security for wireless channel models with continuous random variables rely on this weak notion of secrecy, even though previous work has shown that it is possible to determine the ultimate secrecy rates for discrete memoryless broadcast channels under a stronger secrecy criterion — namely one which bounds not the rate but the total number of bits obtained by the eavesdropper. Seeking to bridge the existing gap between fundamental cryptographic requirements and ongoing research in wireless security, we present a proof for the secrecy capacity of Gaussian broadcast channels under the strong secrecy criterion. As in the discrete memoryless case, the secrecy capacity is found to be the same as in the weaker formulation. The extension to fading channels is shown to be straightforward.
KeywordsFading Channel Wireless Channel Gaussian Channel Secrecy Capacity Wiretap Channel
Unable to display preview. Download preview PDF.
- 1.Barros, J., Rodrigues, M.R.D.: Secrecy capacity of wireless channels. In: Proceedings of the IEEE International Symposium on Information Theory, Seattle, WA (2006)Google Scholar
- 3.Bloch, M., Thangaraj, A., McLaughlin, S.W., Merolla, J.-M.: LDPC-based Gaussian key reconciliation. In: Proc. of the IEEE International Workshop on Information Theory, Punta del Este, Uruguay (March 2006)Google Scholar
- 6.Gopala, P.K., Lai, L., El-Gamal, H.: On the secrecy capacity of fading channels. In: Proceedings of IEEE International Symposium on Information Theory, Nice, France, eprint:cs.IT/0610103 (2007)Google Scholar
- 12.Negi, R., Goel, S.: Secret communication using artificial noise. In: Proceedings of the IEEE Vehicular Technology Conference, Dallas, TX (September 2005)Google Scholar
- 13.Nitinawarat, S.: Secret key generation for correlated gaussian sources. In: Proceedings of the Forty-Fifth Annual Allerton Conference, Monticello, IL (September 2007)Google Scholar
- 14.Parada, P., Blahut, R.: Secrecy capacity of SIMO and slow fading channels. In: Proceedings of the IEEE International Symposium on Information Theory, Adelaide, Australia (September 2005)Google Scholar
- 15.Pinsker, M.S.: Information and Information Stability of Random Variables and Processes. Holden Day (1964)Google Scholar