带有探测约束的私有广播

Y. O. Basciftci, C. E. Koksal
{"title":"带有探测约束的私有广播","authors":"Y. O. Basciftci, C. E. Koksal","doi":"10.1109/SPAWC.2014.6941819","DOIUrl":null,"url":null,"abstract":"We consider a three-receiver wiretap channel in which the transmitter aims to send a common message to legitimate receivers 1 and 2 while keeping it secret from the receiver 3 (eavesdropper). The transmitter takes cost constrained actions to probe the transmitter-to-receiver 1 and transmitter-to-receiver 2 channels. Under the probing cost constraint, we provide a lower bound to the secrecy capacity of this setting. The achievability strategy employs a block Markov coding strategy in which the channel state sequence of the previous block is mapped to a key which secures the part of the confidential message to be transmitted in the current block. The challenge in using the state sequence as a source of the key is the fact that the legitimate receivers are not aware of each other's channel state. To that end, we employ a novel strategy in which the transmitter takes XOR of individual keys generated from the state sequences of transmitter-to receiver 1 and transmitter-to-receiver 2 channels and send the XOR-ed key along with the confidential message. We furthermore analyze the trade-off between the achievable secrecy rate and the probing cost constraint. We conclude that there is a linear dependency between the key rate and probing cost constraint.","PeriodicalId":420837,"journal":{"name":"2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Private broadcasting with probing constraint\",\"authors\":\"Y. O. Basciftci, C. E. Koksal\",\"doi\":\"10.1109/SPAWC.2014.6941819\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider a three-receiver wiretap channel in which the transmitter aims to send a common message to legitimate receivers 1 and 2 while keeping it secret from the receiver 3 (eavesdropper). The transmitter takes cost constrained actions to probe the transmitter-to-receiver 1 and transmitter-to-receiver 2 channels. Under the probing cost constraint, we provide a lower bound to the secrecy capacity of this setting. The achievability strategy employs a block Markov coding strategy in which the channel state sequence of the previous block is mapped to a key which secures the part of the confidential message to be transmitted in the current block. The challenge in using the state sequence as a source of the key is the fact that the legitimate receivers are not aware of each other's channel state. To that end, we employ a novel strategy in which the transmitter takes XOR of individual keys generated from the state sequences of transmitter-to receiver 1 and transmitter-to-receiver 2 channels and send the XOR-ed key along with the confidential message. We furthermore analyze the trade-off between the achievable secrecy rate and the probing cost constraint. We conclude that there is a linear dependency between the key rate and probing cost constraint.\",\"PeriodicalId\":420837,\"journal\":{\"name\":\"2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPAWC.2014.6941819\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPAWC.2014.6941819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

我们考虑一个三接收器窃听信道,其中发射器旨在向合法接收器1和2发送公共消息,同时对接收器3(窃听者)保密。发射机采取代价受限的行动探测发射机到接收机1和发射机到接收机2信道。在探测成本约束下,给出了该设置的保密能力的下界。可实现性策略采用块马尔可夫编码策略,将前一个块的信道状态序列映射到当前块中要传输的机密消息部分的密钥上。使用状态序列作为密钥源的挑战在于合法的接收方并不知道彼此的通道状态。为此,我们采用了一种新颖的策略,在该策略中,发送方从发送方到接收方1和发送方到接收方2通道的状态序列中获取单个密钥的异或值,并将异或值的密钥与机密消息一起发送。进一步分析了可实现保密率与探测成本约束之间的权衡关系。我们得出结论,在密钥率和探测成本约束之间存在线性依赖关系。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Private broadcasting with probing constraint
We consider a three-receiver wiretap channel in which the transmitter aims to send a common message to legitimate receivers 1 and 2 while keeping it secret from the receiver 3 (eavesdropper). The transmitter takes cost constrained actions to probe the transmitter-to-receiver 1 and transmitter-to-receiver 2 channels. Under the probing cost constraint, we provide a lower bound to the secrecy capacity of this setting. The achievability strategy employs a block Markov coding strategy in which the channel state sequence of the previous block is mapped to a key which secures the part of the confidential message to be transmitted in the current block. The challenge in using the state sequence as a source of the key is the fact that the legitimate receivers are not aware of each other's channel state. To that end, we employ a novel strategy in which the transmitter takes XOR of individual keys generated from the state sequences of transmitter-to receiver 1 and transmitter-to-receiver 2 channels and send the XOR-ed key along with the confidential message. We furthermore analyze the trade-off between the achievable secrecy rate and the probing cost constraint. We conclude that there is a linear dependency between the key rate and probing cost constraint.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信