Wiretap channel capacity: Secrecy criteria, strong converse, and phase change

01/25/2017
by   Eric Graves, et al.
0

This paper employs equal-image-size source partitioning techniques to derive the capacities of the general discrete memoryless wiretap channel (DM-WTC) under four different secrecy criteria. These criteria respectively specify requirements on the expected values and tail probabilities of the differences, in absolute value and in exponent, between the joint probability of the secret message and the eavesdropper's observation and the corresponding probability if they were independent. Some of these criteria reduce back to the standard leakage and variation distance constraints that have been previously considered in the literature. The capacities under these secrecy criteria are found to be different when non-vanishing error and secrecy tolerances are allowed. Based on these new results, we are able to conclude that the strong converse property generally holds for the DM-WTC only under the two secrecy criteria based on constraining the tail probabilities. Under the secrecy criteria based on the expected values, an interesting phase change phenomenon is observed as the tolerance values vary.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/07/2020

Strong Secrecy for General Multiple-Access Wiretap Channels

This paper is concerned with the general multiple access wiretap channel...
research
06/26/2023

Capacity Bounds for Identification With Effective Secrecy

An upper bound to the identification capacity of discrete memoryless wir...
research
12/02/2015

Equal-image-size source partitioning: Creating strong Fano's inequalities for multi-terminal discrete memoryless channels

This paper introduces equal-image-size source partitioning, a new tool f...
research
12/14/2017

Secret Message Transmission over Quantum Channels under Adversarial Quantum Noise: Secrecy Capacity and Super-Activation

We determine the secrecy capacities of arbitrarily varying quantum chann...
research
02/12/2020

Fundamental Limits of Biometric Identification Systems with Strong Secrecy

The fundamental limits of biometric identification systems under a stron...
research
01/02/2018

Exact Soft-Covering Exponent

This work establishes the exact exponent for the soft-covering phenomeno...
research
01/02/2018

Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels

This paper derives upper and lower bounds on the secrecy capacity-memory...

Please sign up or login with your details

Forgot password? Click here to reset