Semantic-Security Capacity for Wiretap Channels of Type II

Ziv Goldfeld, Paul Cuff, Haim H. Permuter

Research output: Contribution to journalArticlepeer-review

55 Scopus citations

Abstract

The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its semantic-security (SS) capacity. In this setting, the legitimate users communicate via a discrete-memoryless (DM) channel in the presence of an eavesdropper that has perfect access to a subset of its choosing of the transmitted symbols, constrained to a fixed fraction of the blocklength. The secrecy criterion is achieved simultaneously for all possible eavesdropper subset choices. The SS criterion demands negligible mutual information between the message and the eavesdropper's observations even when maximized over all message distributions. A key tool for the achievability proof is a novel and stronger version of Wyner's soft covering lemma. Specifically, a random codebook is shown to achieve the soft-covering phenomenon with high probability. The probability of failure is doubly exponentially small in the blocklength. Since the combined number of messages and subsets grows only exponentially with the blocklength, SS for the WTC II is established by using the union bound and invoking the stronger soft-covering lemma. The direct proof shows that rates up to the weak-secrecy capacity of the classic WTC with a DM erasure channel (EC) to the eavesdropper are achievable. The converse follows by establishing the capacity of this DM wiretap EC as an upper bound for the WTC II. From a broader perspective, the stronger soft-covering lemma constitutes a tool for showing the existence of codebooks that satisfy exponentially many constraints, a beneficial ability for many other applications in information theoretic security.

Original languageEnglish
Article number7467522
Pages (from-to)3863-3879
Number of pages17
JournalIEEE Transactions on Information Theory
Volume62
Issue number7
DOIs
StatePublished - 1 Jul 2016

Keywords

  • Erasure wiretap channel
  • Wiretap channel of type II
  • information theoretic security
  • semantic-security
  • soft-covering lemma

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'Semantic-Security Capacity for Wiretap Channels of Type II'. Together they form a unique fingerprint.

Cite this