TY - GEN
T1 - Key-Message Security over State-Dependent Wiretap Channels
AU - Bunin, Alexander
AU - Goldfeld, Ziv
AU - Permuter, Haim H.
AU - Shamai, Shlomo
AU - Cuff, Paul
AU - Piantanida, Pablo
N1 - Funding Information:
The work of A. Bunin and S. Shamai was supported by the European Union’s Horizon 2020 Research and Innovation Programme, grant agreement #694630. The work of Z. Goldfeld and H. Permuter was supported by the Israel Science Foundation (grant #684/11), an ERC starting grant and the Cyber Security Research Grant at Ben-Gurion University. Z. Goldfeld was also supported by the Rothschild postdoc fellowship and by a grant from Skoltech–MIT Joint Next Generation Program (NGP). The work of P. Cuff was supported by the National Science Foundation, grant CCF-1350595, and the Air Force Office of Scientific Research, grant FA9550-15-1-0180.
Publisher Copyright:
© 2018 IEEE.
PY - 2018/8/15
Y1 - 2018/8/15
N2 - The state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) available at the encoder is considered. An inner bound on the trade-off region between admissible secret key (SK) and secret message (SM) rates is provided. The result is derived under the stringent semantic-security metric. Our inner bound recovers the best-known achievability results for either SK generation, SM transmission, or simultaneous execution of both. Since some of these past benchmarks were derived under weaker security metrics, our results imply that an upgrade to semantic-security is possible without inflicting any rate loss. It is shown that for certain instances of the considered SD-WTC, the derived region is strictly larger than the previously best-known SK-SM trade-off region reported by Prabhakaran et al., and that a recently reported SK rate for this setup cannot be achieved.
AB - The state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) available at the encoder is considered. An inner bound on the trade-off region between admissible secret key (SK) and secret message (SM) rates is provided. The result is derived under the stringent semantic-security metric. Our inner bound recovers the best-known achievability results for either SK generation, SM transmission, or simultaneous execution of both. Since some of these past benchmarks were derived under weaker security metrics, our results imply that an upgrade to semantic-security is possible without inflicting any rate loss. It is shown that for certain instances of the considered SD-WTC, the derived region is strictly larger than the previously best-known SK-SM trade-off region reported by Prabhakaran et al., and that a recently reported SK rate for this setup cannot be achieved.
UR - http://www.scopus.com/inward/record.url?scp=85052470227&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2018.8437854
DO - 10.1109/ISIT.2018.8437854
M3 - Conference contribution
AN - SCOPUS:85052470227
SN - 9781538647806
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 136
EP - 140
BT - 2018 IEEE International Symposium on Information Theory, ISIT 2018
PB - Institute of Electrical and Electronics Engineers
T2 - 2018 IEEE International Symposium on Information Theory, ISIT 2018
Y2 - 17 June 2018 through 22 June 2018
ER -