TY - JOUR
T1 - Semantic-Security Capacity for Wiretap Channels of Type II
AU - Goldfeld, Ziv
AU - Cuff, Paul
AU - Permuter, Haim H.
N1 - Funding Information:
Z. Goldfeld and H. H. Permuter were supported in part by European Research Council under the European Union's Seventh Framework Programme (FP7/2007-2013)/ERC grant agreement n°337752 and in part by the Cyber Security Research Center within the Ben-Gurion University of the Negev. P. Cuff was supported in part by the National Science Foundation under Grant CCF-1350595 and in part by the Air Force Office of Scientific Research under Grant FA9550-15-1-0180.
Publisher Copyright:
© 2016 IEEE.
PY - 2016/7/1
Y1 - 2016/7/1
N2 - The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its semantic-security (SS) capacity. In this setting, the legitimate users communicate via a discrete-memoryless (DM) channel in the presence of an eavesdropper that has perfect access to a subset of its choosing of the transmitted symbols, constrained to a fixed fraction of the blocklength. The secrecy criterion is achieved simultaneously for all possible eavesdropper subset choices. The SS criterion demands negligible mutual information between the message and the eavesdropper's observations even when maximized over all message distributions. A key tool for the achievability proof is a novel and stronger version of Wyner's soft covering lemma. Specifically, a random codebook is shown to achieve the soft-covering phenomenon with high probability. The probability of failure is doubly exponentially small in the blocklength. Since the combined number of messages and subsets grows only exponentially with the blocklength, SS for the WTC II is established by using the union bound and invoking the stronger soft-covering lemma. The direct proof shows that rates up to the weak-secrecy capacity of the classic WTC with a DM erasure channel (EC) to the eavesdropper are achievable. The converse follows by establishing the capacity of this DM wiretap EC as an upper bound for the WTC II. From a broader perspective, the stronger soft-covering lemma constitutes a tool for showing the existence of codebooks that satisfy exponentially many constraints, a beneficial ability for many other applications in information theoretic security.
AB - The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its semantic-security (SS) capacity. In this setting, the legitimate users communicate via a discrete-memoryless (DM) channel in the presence of an eavesdropper that has perfect access to a subset of its choosing of the transmitted symbols, constrained to a fixed fraction of the blocklength. The secrecy criterion is achieved simultaneously for all possible eavesdropper subset choices. The SS criterion demands negligible mutual information between the message and the eavesdropper's observations even when maximized over all message distributions. A key tool for the achievability proof is a novel and stronger version of Wyner's soft covering lemma. Specifically, a random codebook is shown to achieve the soft-covering phenomenon with high probability. The probability of failure is doubly exponentially small in the blocklength. Since the combined number of messages and subsets grows only exponentially with the blocklength, SS for the WTC II is established by using the union bound and invoking the stronger soft-covering lemma. The direct proof shows that rates up to the weak-secrecy capacity of the classic WTC with a DM erasure channel (EC) to the eavesdropper are achievable. The converse follows by establishing the capacity of this DM wiretap EC as an upper bound for the WTC II. From a broader perspective, the stronger soft-covering lemma constitutes a tool for showing the existence of codebooks that satisfy exponentially many constraints, a beneficial ability for many other applications in information theoretic security.
KW - Erasure wiretap channel
KW - Wiretap channel of type II
KW - information theoretic security
KW - semantic-security
KW - soft-covering lemma
UR - http://www.scopus.com/inward/record.url?scp=84976464604&partnerID=8YFLogxK
U2 - 10.1109/TIT.2016.2565483
DO - 10.1109/TIT.2016.2565483
M3 - Article
AN - SCOPUS:84976464604
SN - 0018-9448
VL - 62
SP - 3863
EP - 3879
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 7
M1 - 7467522
ER -