@article{effa79efd3d245d48719b8b592c89fcb,
title = "Key and Message Semantic-Security over State-Dependent Channels",
abstract = "We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.",
keywords = "Channel state information, Physical layer security, Secrecy capacity, Secret key, Semantic security, Wiretap channel",
author = "Alexander Bunin and Ziv Goldfeld and Permuter, {Haim H.} and Shitz, {Shlomo Shamai} and Paul Cuff and Pablo Piantanida",
note = "Funding Information: Manuscript received August 23, 2017; revised February 5, 2018 and May 25, 2018; accepted June 12, 2018. Date of publication July 5, 2018; date of current version December 31, 2019. The work of A. Bunin and S. Shamai was supported by the European Union{\textquoteright}s Horizon 2020 Research and Innovation Programme under Grant 694630. The work of Z. Goldfeld was supported in part by the Israel Science Foundation under Grant 818/17, in part by an ERC Starting Grant, in part by the Cyber Security Research Grant at the Ben-Gurion University of the Negev, in part by the Rothschild Postdoc Fellowship, and in part by the Skoltech–MIT Joint Next Generation Program (NGP). The work of H. H. Permuter was supported in part by the Israel Science Foundation under Grant 818/17, in part by an ERC Starting Grant, in part by the Cyber Security Research Grant at the Ben-Gurion University of the Negev. The work of P. Cuff was supported in part by the National Science Foundation under Grant CCF-1350595 and in part by the Air Force Office of Scientific Research under Grant FA9550-15-1-0180. Partial results of this work were presented at the 2017 International Workshop on Communication Security (WCS) [1] and at the 2018 IEEE International Symposium on Information Theory (ISIT). An early version of this work was submitted to arXiv [2]. Proofs of several technical claims, which were omitted in this paper due to length restrictions, may be found in the appendices of the arXiv version. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Tanya Ignatenko. (Corresponding author: Alexander Bunin.) A. Bunin and S. Shamai (Shitz) are with the Department of Electrical Engineering, Technion–Israel Institute of Technology, Haifa 3200003, Israel (e-mail: albun@tx.technion.ac.il; sshlomo@ee.technion.ac.il). Funding Information: The work of A. Bunin and S. Shamai was supported by the European Union's Horizon 2020 Research and Innovation Programme under Grant 694630. The work of Z. Goldfeld was supported in part by the Israel Science Foundation under Grant 818/17, in part by an ERC Starting Grant, in part by the Cyber Security Research Grant at the Ben-Gurion University of the Negev, in part by the Rothschild Postdoc Fellowship, and in part by the Skoltech-MIT Joint Next Generation Program (NGP). The work of H. H. Permuter was supported in part by the Israel Science Foundation under Grant 818/17, in part by an ERC Starting Grant, in part by the Cyber Security Research Grant at the Ben-Gurion University of the Negev. The work of P. Cuff was supported in part by the National Science Foundation under Grant CCF-1350595 and in part by the Air Force Office of Scientific Research under Grant FA9550-15-1-0180 Publisher Copyright: {\textcopyright} 2005-2012 IEEE.",
year = "2020",
month = jul,
day = "4",
doi = "10.1109/TIFS.2018.2853108",
language = "English",
volume = "15",
pages = "1541--1556",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers",
number = "1",
}