Secure broadcasting over fading channels

被引:206
作者
Khisti, Ashish [1 ]
Tchamkerten, Aslan [1 ]
Wornell, Gregory W. [1 ]
机构
[1] MIT, Elect Res Lab, Cambridge, MA 02139 USA
关键词
confidential messages; cryptography; fading channels; information-theoretic secrecy; key distribution; multicasting; multiuser diversity; parallel channels; wiretap channel;
D O I
10.1109/TIT.2008.921861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all receivers are to obtain a common message; and 2) each receiver is to obtain an independent message. Moreover, two models are considered: parallel channels and fast-fading channels. For the case of reversely degraded parallel channels, one eavesdropper, and an arbitrary number of legitimate receivers, we determine the secrecy capacity for transmitting a common message, and the secrecy sum-capacity for transmitting independent messages. For the case of fast-fading channels, we assume that the channel state information of the legitimate receivers is known to all the terminals, while that of the eavesdropper is known only to itself. We show that, using a suitable binning strategy, a common message can be reliably and securely transmitted at a rate independent of the number of receivers. We also show that a simple opportunistic transmission strategy is optimal for the reliable and secure transmission of independent messages in the limit of large number of receivers.
引用
收藏
页码:2453 / 2469
页数:17
相关论文
共 25 条
[1]
Adams Malcolm, 1996, MEASURE THEORY PROBA
[2]
Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[3]
On the capacity of some channels with channel state information [J].
Caire, G ;
Shamai, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (06) :2007-2019
[4]
Cover TM, 2006, Elements of Information Theory
[5]
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[6]
DAVID HA, 1981, ORDER STAT
[7]
NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]
ELGAMAL A, 1980, PROBL INFORMATIO JAN, P3
[9]
Fiat A., 1994, LECT NOTES COMPUTER, V773, P480, DOI DOI 10.1007/3-540-48329-2
[10]
Capacity of fading channels with channel side information [J].
Goldsmith, AJ ;
Varaiya, PP .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1997, 43 (06) :1986-1992