19
TU M¨ unchen Theoretische Informationstechnik The Individual Secrecy Capacity of Degraded Multi-Receiver Wiretap Broadcast Channels Ahmed S. Mansour * , Rafael F. Schaefer and Holger Boche * * Lehrstuhl f¨ ur Theoretische Informationstechnik Technische Universit¨ at M¨ unchen, Germany Department of Electrical Engineering Princeton University, USA June 9, 2015 Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1

Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

Embed Size (px)

Citation preview

Page 1: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

The Individual Secrecy Capacity of Degraded Multi-Receiver WiretapBroadcast Channels

Ahmed S. Mansour∗, Rafael F. Schaefer† and Holger Boche∗

∗ Lehrstuhl fur Theoretische Informationstechnik

Technische Universitat Munchen, Germany

† Department of Electrical Engineering

Princeton University, USA

June 9, 2015

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1

Page 2: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Outline

1 Introduction

2 Joint Secrecy Capacity Region

3 Individual Secrecy Capacity Region

4 Comparison of Secrecy Capacity Region

5 Conclusion & Future Work

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 2

Page 3: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Outline

1 Introduction

2 Joint Secrecy Capacity Region

3 Individual Secrecy Capacity Region

4 Comparison of Secrecy Capacity Region

5 Conclusion & Future Work

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 3

Page 4: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Information Theoretic Security

Secret Key encoding [Shannon ’49]

⇒ M⊗ = M⊗K, Secrecy Requirement: I(M; Zn) = 0.⇒ Transmit xn(m⊗) → H(M) ≤ H(K)

Wiretap Random Coding [Csiszar/Korner ’78]

⇒ Randomization message mr to confuse the eavesdropper.⇒ Secrecy Requirement: limn→∞ I(M; Zn) = 0.⇒ Transmit xn(m,mr) → Rr ≥ I(X; Z).

Random Coding + Secret Key encoding [Kang/Liu ’10]

⇒ m⊗ plays a role in confusing the eavesdropper.⇒ Secrecy Requirement: limn→∞ I(M; Zn) = 0.⇒ Transmit xn(m,m⊗,mr) → Rr +R⊗ ≥ I(X; Z).

C. Shannon, “Communication theory of secrecy systems,” vol. 28, pp. 656–715,Oct. 1949

I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEETrans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978

W. Kang and N. Liu, “Wiretap channel with shared key,” Dublin, Ireland, Sep. 2010,pp. 1–5

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 4

Page 5: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Degraded Multi-Receiver Wiretap BC

ChannelEncoderTx R1

M1

R2

M2

Rk

Mk

RZ

(M1, . . . ,Mk) Xn Yn1 Yn

2 Yn3 . . . . . . Yn

k Zn

Important Feature: X−Y1 −Y2 − · · ·−Yk − Z

Reliability Requirement:

Pe(Cn) , P[M1 6= M1 or . . . or Mk 6= Mk

].

Rj ≤1

nI(Mj ; Yn

j ) + γj(εn)

Secrecy Requirement:

Joint Secrecy:

⇒ I(M1, . . . ,Mk; Zn) ≤ τn

Individual Secrecy:

⇒∑k

j=1 I(Mj ; Zn) ≤ τn

Properties?, Which one? and Why???

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 5

Page 6: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Joint Secrecy Vs Individual Secrecy

1 Joint Secrecy: I(M1, . . . ,Mk; Zn) ≤ τnFocus of most previous works.Receivers do not trust each other.Conservative and immune against compromised receivers.Vanishing capacity for eavesdropper with statistical advantage.

2 Individual Secrecy:∑k

j=1 I(Mj ; Zn) ≤ τnBC with message cognition. [Mansour/Schaefer/Boche ’15]

Mutual trust and Receiver cooperation.less conservative, secrecy might fails.Higher throughput is expected.How to encode? Use messages as secret keys.

A. S. Mansour, R. F. Schaefer, and H. Boche, “Capacity regions for broadcastchannels with degraded message sets and message cognition under different secrecyconstraints,” CoRR, vol. abs/1501.04490, January 2015, [Online]

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 6

Page 7: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Outline

1 Introduction

2 Joint Secrecy Capacity Region

3 Individual Secrecy Capacity Region

4 Comparison of Secrecy Capacity Region

5 Conclusion & Future Work

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 7

Page 8: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Joint Secrecy: Achievability and Converse

Theorem 1: Capacity Region [Ekrem/Ulukus/ ’09]

The joint secrecy capacity region of the degraded multi-receiverwiretap BC is given by all rate tuples (R1, . . . , Rk) ∈ Rk+

Rj ≤ I(Uj ; Yj |Uj+1)− I(Uj ; Z|Uj+1)

where U1 = X, Uk+1 = ∅ and the union is taken over all randomvariables such that, Uk − · · · −U2 −X−Y1−Y2 − · · ·−Yk − Z .

Achievability: Superposition encoding with Random binning.

Converse: Standard Techniques + Prop. of Markov chain.

For a two-receiver wiretap BC:

R2 ≤ I(U; Y2)− I(U; Z)R1 ≤ I(X; Y1|U)− I(X; Z|U)

E. Ekrem and S. Ulukus, “Secrecy capacity of a class of broadcast channels withan eavesdropper,” EURASIP J. Wirel. Commun. Netw., pp. 1–29, March 2009

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 8

Page 9: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Outline

1 Introduction

2 Joint Secrecy Capacity Region

3 Individual Secrecy Capacity Region

4 Comparison of Secrecy Capacity Region

5 Conclusion & Future Work

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 9

Page 10: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Individual Secrecy: Achievability

Theorem 2: Degraded Two-Receiver Wiretap BC

The individual secrecy capacity region of the degraded two-receiverwiretap BC is given by the union of all rate pairs (R1, R2) ∈ R2

+

that satisfy

R2 ≤ I(U; Y2)− I(U; Z)

R1 ≤ I(X; Y1|U) + I(U; Z)

R1 ≤ I(X; Y1|U)− I(X; Z|U) +R2

where the union is taken over all random variables (U,X), suchthat U−X−Y1 −Y2 − Z forms a Markov chain.

Achievability: Random coding + Secret Key encoding.

Y1 can decode m2: Prop. of degraded BC.⇒ m2 is used a secret key for Y1.

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 10

Page 11: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Individual Secrecy: Multi-Receiver Wiretap BC

Theorem 3: Capacity Region

The individual secrecy capacity region of the degraded multi-receiver wiretap BC is given by the union of all rate tuples(R1, . . . , Rk) ∈ Rk+ that satisfy

Rj ≤ I(Uj ; Yj |Uj+1)− I(Uj ; Z|Uj+1) +

k∑l=j+1

Rl

Rj ≤ I(Uj ; Yj |Uj+1) + I(Uj+1; Z)

k∑l=j

Rl ≤k∑l=j

I(Ul; Yl|Ul+1)

where U1 = X, Uk+1 = ∅ and the union runs over all randomvariables such that, Uk − · · · −U2 −X−Y1 −Y2 − · · ·−Yk − Z.

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 11

Page 12: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Bounds Implication and Converse

1 Rj ≤ I(Uj ; Yj |Uj+1)− I(Uj ; Z|Uj+1) +∑k

l=j+1Rl.

⇒ Total Rate = Random Coded + Secret Key Encoded.⇒ Adapting the Joint converse by

∑kl=j+1Rl.

2 Rj ≤ I(Uj ; Yj |Uj+1) + I(Uj+1; Z)

⇒ A User’s Rate = Information in his own layer + RandomizationIndcies of Lower Layers.

⇒ Rj ≤ 1n

[I(Mj ; Yn

j |Mj+1) + I(Mj+1; Zn)]

+ γj(εn)

3∑k

l=j Rl ≤∑k

l=j I(Ul; Yl|Ul+1)

⇒ A Randomization index can be used only once.⇒ Reliability Bound as in Degraded BC without secrecy.

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 12

Page 13: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Outline

1 Introduction

2 Joint Secrecy Capacity Region

3 Individual Secrecy Capacity Region

4 Comparison of Secrecy Capacity Region

5 Conclusion & Future Work

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 13

Page 14: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Gaussian Two-Receiver Wiretap BC

Theorem 4: Capacity Region: Joint Vs Individual

Consider a two-receiver Gaussian wiretap BC, the joint secrecycapacity region is given by

R2 ≤ f(

1 + αPαP+σ2

2

)− f

(1 + αP

αP+σ2Z

)R1 ≤ f

(1 + αP

σ21

)− f

(1 + αP

σ2Z

),

while the individual secrecy capacity region is given by

R2 ≤ f(

1 + αPαP+σ2

2

)− f

(1 + αP

αP+σ2Z

)R1 ≤ f

(1 + αP

σ21

)+ f

(1 + αP

αP+σ2Z

)R1 ≤ f

(1 + αP

σ21

)− f

(1 + αP

σ2Z

)+R2,

where f(x) = 12 log(x) and α = 1− α.

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 14

Page 15: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Example

Sweep over α.

⇒ σ21 = 0.05,σ22 = 0.1,σ2Z = 0.15.

Higher throughputfor IndividualSecrecy

R1 > 0, althoughα = 0.

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

R1

R2

Joint Secrecy Capacity Individual Secrecy Capacity

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 15

Page 16: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Outline

1 Introduction

2 Joint Secrecy Capacity Region

3 Individual Secrecy Capacity Region

4 Comparison of Secrecy Capacity Region

5 Conclusion & Future Work

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 16

Page 17: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Conclusion & Future Work

Conclusion

⇒ Investigated secrecy in degraded multi-receiver wiretap BC.⇒ Established the individual secrecy capacity region.⇒ Bigger capacity region as compared to the joint one.

Extensions and Future work

⇒ Extension to the Gaussian BC. (Done)⇒ Extension to the MIMO Gaussian BC. (In Progress)⇒ Investigation of the less noisy wiretap BC. (In Progress)

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 17

Page 18: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

References I

C. Shannon, “Communication theory of secrecy systems,” vol. 28, pp.656–715, Oct. 1949.

I. Csiszar and J. Korner, “Broadcast channels with confidential messages,”IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.

W. Kang and N. Liu, “Wiretap channel with shared key,” Dublin, Ireland,Sep. 2010, pp. 1–5.

A. S. Mansour, R. F. Schaefer, and H. Boche, “Capacity regions forbroadcast channels with degraded message sets and message cognitionunder different secrecy constraints,” CoRR, vol. abs/1501.04490, January2015, [Online].

E. Ekrem and S. Ulukus, “Secrecy capacity of a class of broadcastchannels with an eavesdropper,” EURASIP J. Wirel. Commun. Netw., pp.1–29, March 2009.

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 18

Page 19: Ahmed S. Mansour, Rafael F. Schaefery and Holger Boche · Ahmed S. Mansour, Rafael F. Schaeferyand Holger Boche ... Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 1. TU

TU Munchen Theoretische Informationstechnik

Thank YOU!

Mansour, Schaefer and Boche Secrecy in Degraded Wiretap BC 19