Secure Broadcasting : The secrecy Rate Region

被引:16
作者
Bagherikaram, Ghadamali [1 ]
Motahari, Abolfazl S. [1 ]
Khandani, Amir K. [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Coding & Signal Transmiss Lab, Waterloo, ON N2L 3G1, Canada
来源
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3 | 2008年
关键词
D O I
10.1109/ALLERTON.2008.4797644
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by equivocation rate at the eavesdropper. We first study the general (non-degraded) broadcast channel with confidential messages. We present an inner bound on the secrecy capacity region for this model. The inner bound coding scheme is based on a combination of random binning and the Gelfand-Pinsker bining. This scheme matches the Marton's inner bound on the broadcast channel without confidentiality constraint We further study the situation where the channels are degraded. For the degraded broadcast channel with confidential messages, we present the secrecy capacity region. Our achievable coding scheme is based on Cover's superposition scheme and random binning. We refer to this scheme as Secret Superposition Scheme. In this scheme, we show that randomization in the first layer increases the secrecy rate of the second layer. This capacity region matches the capacity region of the degraded broadcast channel without security constraint. It also matches the secrecy capacity for the conventional wire-tap channel. Our converse proof is based on a combination of the converse proof of the conventional degraded broadcast channel and Csiszar lemma.
引用
收藏
页码:834 / 841
页数:8
相关论文
共 34 条
[1]
CHAN C, SUCCESS EXPONENT WIR
[2]
Cover TM, 2006, Elements of Information Theory
[3]
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[4]
Gel'fand S., 1980, PROBL CONTR INF THEO, V9, P1931
[5]
GOPALA PK, SECRECY CAPACITY FAD
[6]
KHISTI A, SECURE BROADCASTING
[7]
KHISTI A, IEEE T INF THE UNPUB
[8]
Khisti A., 2007, P IEEE INT S INF THE
[9]
KOYLUOGLU OO, 2008, P 2008 IEEE INT S IN
[10]
LAI L, IEEE T INFORM UNPUB