Capacity Bounds for Identification With Effective Secrecy

06/26/2023
by   Johannes Rosenberger, et al.
0

An upper bound to the identification capacity of discrete memoryless wiretap channels is derived under the requirement of semantic effective secrecy, combining semantic secrecy and stealth constraints. A previously established lower bound is improved by applying it to a prefix channel, formed by concatenating an auxiliary channel and the actual channel. The bounds are tight if the legitimate channel is more capable than the eavesdropper's channel. An illustrative example is provided for a wiretap channel that is composed of a point-to-point channel, and a parallel, reversely degraded wiretap channel. A comparison with results for message transmission and for identification with only secrecy constraint is provided.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/30/2018

Secure and Robust Identification via Classical-Quantum Channels

We study the identification capacity of classical-quantum channels ("cq-...
research
04/09/2020

The Secrecy Capacity of Cost-Constrained Wiretap Channels

In many information-theoretic communication problems, adding an input co...
research
01/02/2018

Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels

This paper derives upper and lower bounds on the secrecy capacity-memory...
research
04/24/2018

On the Secrecy Capacity of a Full-Duplex Wirelessly Powered Communication System in the Presence of a Passive Eavesdropper

In this paper, we investigate the secrecy capacity of a point-to-point, ...
research
01/25/2017

Wiretap channel capacity: Secrecy criteria, strong converse, and phase change

This paper employs equal-image-size source partitioning techniques to de...
research
01/01/2023

Information Transfer Rate in BCIs: Towards Tightly Integrated Symbiosis

The information transmission rate (ITR), or effective bit rate, is a pop...
research
02/18/2020

Secure Status Updates under Eavesdropping: Age of Information-based Physical Layer Security Metrics

This letter studies the problem of maintaining information freshness und...

Please sign up or login with your details

Forgot password? Click here to reset