{"title":"使用独立密钥安全地广播公共消息","authors":"R. Schaefer, A. Khisti","doi":"10.1109/CISS.2014.6814137","DOIUrl":null,"url":null,"abstract":"The problem of secure broadcasting with independent secret keys is studied. The particular scenario is analyzed where a common message has to be broadcasted to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers, which can be used in different ways: They can be used as one-time pads to encrypt the common message or they can be used as randomization resources for wiretap coding. Both approaches are studied in this paper. If both legitimate channels are degraded versions of the eavesdropper channel, it is shown that the one-time pad approach is optimal for several cases yielding corresponding capacity expressions. Reversely, the wiretap coding approach is shown to be optimal if the eavesdropper channel is degraded with respect to both legitimate channels establishing capacity in this case as well.","PeriodicalId":169460,"journal":{"name":"2014 48th Annual Conference on Information Sciences and Systems (CISS)","volume":"76 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Secure broadcasting of a common message with independent secret keys\",\"authors\":\"R. Schaefer, A. Khisti\",\"doi\":\"10.1109/CISS.2014.6814137\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The problem of secure broadcasting with independent secret keys is studied. The particular scenario is analyzed where a common message has to be broadcasted to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers, which can be used in different ways: They can be used as one-time pads to encrypt the common message or they can be used as randomization resources for wiretap coding. Both approaches are studied in this paper. If both legitimate channels are degraded versions of the eavesdropper channel, it is shown that the one-time pad approach is optimal for several cases yielding corresponding capacity expressions. Reversely, the wiretap coding approach is shown to be optimal if the eavesdropper channel is degraded with respect to both legitimate channels establishing capacity in this case as well.\",\"PeriodicalId\":169460,\"journal\":{\"name\":\"2014 48th Annual Conference on Information Sciences and Systems (CISS)\",\"volume\":\"76 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-03-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 48th Annual Conference on Information Sciences and Systems (CISS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISS.2014.6814137\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 48th Annual Conference on Information Sciences and Systems (CISS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISS.2014.6814137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure broadcasting of a common message with independent secret keys
The problem of secure broadcasting with independent secret keys is studied. The particular scenario is analyzed where a common message has to be broadcasted to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers, which can be used in different ways: They can be used as one-time pads to encrypt the common message or they can be used as randomization resources for wiretap coding. Both approaches are studied in this paper. If both legitimate channels are degraded versions of the eavesdropper channel, it is shown that the one-time pad approach is optimal for several cases yielding corresponding capacity expressions. Reversely, the wiretap coding approach is shown to be optimal if the eavesdropper channel is degraded with respect to both legitimate channels establishing capacity in this case as well.