Semantically-Secured message-Key trade-Off over wiretap channels with random parameters: Invited paper

Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai Shitz, Paul Cuff, Pablo Piantanida

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations


We study the trade-off between secret message (SM) and secret key (SK) rates simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. Thismodel subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a novel superposition coding scheme. Our inner bound improves upon the previously best known SM-SK trade-off result by Prabhakaran et al., and to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup. The results are derived under the strict semantic-security metric that requires negligible information leakage for all message-key distributions. The achievability proof uses the strong soft-covering lemma for superposition codes.

Original languageEnglish
Title of host publicationProceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security
EditorsStefano Tomasin, Marco Baldi, Elizabeth A. Quaglia
PublisherSpringer Verlag
Number of pages16
ISBN (Print)9783319592640
StatePublished - 1 Jan 2018
Event2nd Workshop on Communication Security, WCS 2017 - Paris, France
Duration: 30 Apr 201730 Apr 2017

Publication series

NameLecture Notes in Electrical Engineering
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119


Conference2nd Workshop on Communication Security, WCS 2017

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering


Dive into the research topics of 'Semantically-Secured message-Key trade-Off over wiretap channels with random parameters: Invited paper'. Together they form a unique fingerprint.

Cite this