Upload
vuongtruc
View
227
Download
0
Embed Size (px)
Citation preview
TU Munchen Theoretische Informationstechnik
The Individual Secrecy Capacity of Degraded Multi-Receiver WiretapBroadcast Channels
Ahmed S. Mansour∗, Rafael F. Schaefer† and Holger Boche∗
∗ Lehrstuhl fur Theoretische Informationstechnik
Technische Universitat Munchen, Germany
† Department of Electrical Engineering
Princeton University, USA
June 9, 2015
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1
TU Munchen Theoretische Informationstechnik
Outline
1 Introduction
2 Joint Secrecy Capacity Region
3 Individual Secrecy Capacity Region
4 Comparison of Secrecy Capacity Region
5 Conclusion & Future Work
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 2
TU Munchen Theoretische Informationstechnik
Outline
1 Introduction
2 Joint Secrecy Capacity Region
3 Individual Secrecy Capacity Region
4 Comparison of Secrecy Capacity Region
5 Conclusion & Future Work
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 3
TU Munchen Theoretische Informationstechnik
Information Theoretic Security
Secret Key encoding [Shannon ’49]
⇒ M⊗ = M⊗K, Secrecy Requirement: I(M; Zn) = 0.⇒ Transmit xn(m⊗) → H(M) ≤ H(K)
Wiretap Random Coding [Csiszar/Korner ’78]
⇒ Randomization message mr to confuse the eavesdropper.⇒ Secrecy Requirement: limn→∞ I(M; Zn) = 0.⇒ Transmit xn(m,mr) → Rr ≥ I(X; Z).
Random Coding + Secret Key encoding [Kang/Liu ’10]
⇒ m⊗ plays a role in confusing the eavesdropper.⇒ Secrecy Requirement: limn→∞ I(M; Zn) = 0.⇒ Transmit xn(m,m⊗,mr) → Rr +R⊗ ≥ I(X; Z).
C. Shannon, “Communication theory of secrecy systems,” vol. 28, pp. 656–715,Oct. 1949
I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEETrans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978
W. Kang and N. Liu, “Wiretap channel with shared key,” Dublin, Ireland, Sep. 2010,pp. 1–5
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 4
TU Munchen Theoretische Informationstechnik
Degraded Multi-Receiver Wiretap BC
ChannelEncoderTx R1
M1
R2
M2
Rk
Mk
RZ
(M1, . . . ,Mk) Xn Yn1 Yn
2 Yn3 . . . . . . Yn
k Zn
Important Feature: X−Y1 −Y2 − · · ·−Yk − Z
Reliability Requirement:
Pe(Cn) , P[M1 6= M1 or . . . or Mk 6= Mk
].
Rj ≤1
nI(Mj ; Yn
j ) + γj(εn)
Secrecy Requirement:
Joint Secrecy:
⇒ I(M1, . . . ,Mk; Zn) ≤ τn
Individual Secrecy:
⇒∑k
j=1 I(Mj ; Zn) ≤ τn
Properties?, Which one? and Why???
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 5
TU Munchen Theoretische Informationstechnik
Joint Secrecy Vs Individual Secrecy
1 Joint Secrecy: I(M1, . . . ,Mk; Zn) ≤ τnFocus of most previous works.Receivers do not trust each other.Conservative and immune against compromised receivers.Vanishing capacity for eavesdropper with statistical advantage.
2 Individual Secrecy:∑k
j=1 I(Mj ; Zn) ≤ τnBC with message cognition. [Mansour/Schaefer/Boche ’15]
Mutual trust and Receiver cooperation.less conservative, secrecy might fails.Higher throughput is expected.How to encode? Use messages as secret keys.
A. S. Mansour, R. F. Schaefer, and H. Boche, “Capacity regions for broadcastchannels with degraded message sets and message cognition under different secrecyconstraints,” CoRR, vol. abs/1501.04490, January 2015, [Online]
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 6
TU Munchen Theoretische Informationstechnik
Outline
1 Introduction
2 Joint Secrecy Capacity Region
3 Individual Secrecy Capacity Region
4 Comparison of Secrecy Capacity Region
5 Conclusion & Future Work
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 7
TU Munchen Theoretische Informationstechnik
Joint Secrecy: Achievability and Converse
Theorem 1: Capacity Region [Ekrem/Ulukus/ ’09]
The joint secrecy capacity region of the degraded multi-receiverwiretap BC is given by all rate tuples (R1, . . . , Rk) ∈ Rk+
Rj ≤ I(Uj ; Yj |Uj+1)− I(Uj ; Z|Uj+1)
where U1 = X, Uk+1 = ∅ and the union is taken over all randomvariables such that, Uk − · · · −U2 −X−Y1−Y2 − · · ·−Yk − Z .
Achievability: Superposition encoding with Random binning.
Converse: Standard Techniques + Prop. of Markov chain.
For a two-receiver wiretap BC:
R2 ≤ I(U; Y2)− I(U; Z)R1 ≤ I(X; Y1|U)− I(X; Z|U)
E. Ekrem and S. Ulukus, “Secrecy capacity of a class of broadcast channels withan eavesdropper,” EURASIP J. Wirel. Commun. Netw., pp. 1–29, March 2009
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 8
TU Munchen Theoretische Informationstechnik
Outline
1 Introduction
2 Joint Secrecy Capacity Region
3 Individual Secrecy Capacity Region
4 Comparison of Secrecy Capacity Region
5 Conclusion & Future Work
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 9
TU Munchen Theoretische Informationstechnik
Individual Secrecy: Achievability
Theorem 2: Degraded Two-Receiver Wiretap BC
The individual secrecy capacity region of the degraded two-receiverwiretap BC is given by the union of all rate pairs (R1, R2) ∈ R2
+
that satisfy
R2 ≤ I(U; Y2)− I(U; Z)
R1 ≤ I(X; Y1|U) + I(U; Z)
R1 ≤ I(X; Y1|U)− I(X; Z|U) +R2
where the union is taken over all random variables (U,X), suchthat U−X−Y1 −Y2 − Z forms a Markov chain.
Achievability: Random coding + Secret Key encoding.
Y1 can decode m2: Prop. of degraded BC.⇒ m2 is used a secret key for Y1.
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 10
TU Munchen Theoretische Informationstechnik
Individual Secrecy: Multi-Receiver Wiretap BC
Theorem 3: Capacity Region
The individual secrecy capacity region of the degraded multi-receiver wiretap BC is given by the union of all rate tuples(R1, . . . , Rk) ∈ Rk+ that satisfy
Rj ≤ I(Uj ; Yj |Uj+1)− I(Uj ; Z|Uj+1) +
k∑l=j+1
Rl
Rj ≤ I(Uj ; Yj |Uj+1) + I(Uj+1; Z)
k∑l=j
Rl ≤k∑l=j
I(Ul; Yl|Ul+1)
where U1 = X, Uk+1 = ∅ and the union runs over all randomvariables such that, Uk − · · · −U2 −X−Y1 −Y2 − · · ·−Yk − Z.
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 11
TU Munchen Theoretische Informationstechnik
Bounds Implication and Converse
1 Rj ≤ I(Uj ; Yj |Uj+1)− I(Uj ; Z|Uj+1) +∑k
l=j+1Rl.
⇒ Total Rate = Random Coded + Secret Key Encoded.⇒ Adapting the Joint converse by
∑kl=j+1Rl.
2 Rj ≤ I(Uj ; Yj |Uj+1) + I(Uj+1; Z)
⇒ A User’s Rate = Information in his own layer + RandomizationIndcies of Lower Layers.
⇒ Rj ≤ 1n
[I(Mj ; Yn
j |Mj+1) + I(Mj+1; Zn)]
+ γj(εn)
3∑k
l=j Rl ≤∑k
l=j I(Ul; Yl|Ul+1)
⇒ A Randomization index can be used only once.⇒ Reliability Bound as in Degraded BC without secrecy.
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 12
TU Munchen Theoretische Informationstechnik
Outline
1 Introduction
2 Joint Secrecy Capacity Region
3 Individual Secrecy Capacity Region
4 Comparison of Secrecy Capacity Region
5 Conclusion & Future Work
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 13
TU Munchen Theoretische Informationstechnik
Gaussian Two-Receiver Wiretap BC
Theorem 4: Capacity Region: Joint Vs Individual
Consider a two-receiver Gaussian wiretap BC, the joint secrecycapacity region is given by
R2 ≤ f(
1 + αPαP+σ2
2
)− f
(1 + αP
αP+σ2Z
)R1 ≤ f
(1 + αP
σ21
)− f
(1 + αP
σ2Z
),
while the individual secrecy capacity region is given by
R2 ≤ f(
1 + αPαP+σ2
2
)− f
(1 + αP
αP+σ2Z
)R1 ≤ f
(1 + αP
σ21
)+ f
(1 + αP
αP+σ2Z
)R1 ≤ f
(1 + αP
σ21
)− f
(1 + αP
σ2Z
)+R2,
where f(x) = 12 log(x) and α = 1− α.
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 14
TU Munchen Theoretische Informationstechnik
Example
Sweep over α.
⇒ σ21 = 0.05,σ22 = 0.1,σ2Z = 0.15.
Higher throughputfor IndividualSecrecy
R1 > 0, althoughα = 0.
0 0.2 0.4 0.6 0.8 10
0.2
0.4
0.6
0.8
1
R1
R2
Joint Secrecy Capacity Individual Secrecy Capacity
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 15
TU Munchen Theoretische Informationstechnik
Outline
1 Introduction
2 Joint Secrecy Capacity Region
3 Individual Secrecy Capacity Region
4 Comparison of Secrecy Capacity Region
5 Conclusion & Future Work
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 16
TU Munchen Theoretische Informationstechnik
Conclusion & Future Work
Conclusion
⇒ Investigated secrecy in degraded multi-receiver wiretap BC.⇒ Established the individual secrecy capacity region.⇒ Bigger capacity region as compared to the joint one.
Extensions and Future work
⇒ Extension to the Gaussian BC. (Done)⇒ Extension to the MIMO Gaussian BC. (In Progress)⇒ Investigation of the less noisy wiretap BC. (In Progress)
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 17
TU Munchen Theoretische Informationstechnik
References I
C. Shannon, “Communication theory of secrecy systems,” vol. 28, pp.656–715, Oct. 1949.
I. Csiszar and J. Korner, “Broadcast channels with confidential messages,”IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.
W. Kang and N. Liu, “Wiretap channel with shared key,” Dublin, Ireland,Sep. 2010, pp. 1–5.
A. S. Mansour, R. F. Schaefer, and H. Boche, “Capacity regions forbroadcast channels with degraded message sets and message cognitionunder different secrecy constraints,” CoRR, vol. abs/1501.04490, January2015, [Online].
E. Ekrem and S. Ulukus, “Secrecy capacity of a class of broadcastchannels with an eavesdropper,” EURASIP J. Wirel. Commun. Netw., pp.1–29, March 2009.
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 18
TU Munchen Theoretische Informationstechnik
Thank YOU!
Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 19