2016 IEEE International Symposium on Information Theory (ISIT) 2016
DOI: 10.1109/isit.2016.7541809
|View full text |Cite
|
Sign up to set email alerts
|

Semantic-security capacity for wiretap channels of type II

Abstract: The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its semantic-security (SS) capacity. In this setting, the legitimate users communicate via a discrete-memoryless (DM) channel in the presence of an eavesdropper that has perfect access to a subset of its choosing of the transmitted symbols, constrained to a fixed fraction of the blocklength. The secrecy criterion is achieved simulta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

2
67
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 30 publications
(69 citation statements)
references
References 31 publications
2
67
0
Order By: Relevance
“…We will use the same method in our proofs although the strong secrecy criterion has become more frequent nowadays. Recent works on the wiretap channel employ this approach, e.g., [25], [26], where in particular [26] does not assume the messages have a uniform distribution. December …”
mentioning
confidence: 99%
“…We will use the same method in our proofs although the strong secrecy criterion has become more frequent nowadays. Recent works on the wiretap channel employ this approach, e.g., [25], [26], where in particular [26] does not assume the messages have a uniform distribution. December …”
mentioning
confidence: 99%
“…Semantic secrecy for the Wiretap Channel II with noisy main channel is established in [GCP16]. Although their reliability proof does not apply to our setting with an adversarial main channel, the adversarial nature of the Wiretap Channel II means that the secrecy analysis applies to the AWTC.…”
Section: Semantic Secrecy Via Soft-coveringmentioning
confidence: 98%
“…Although their reliability proof does not apply to our setting with an adversarial main channel, the adversarial nature of the Wiretap Channel II means that the secrecy analysis applies to the AWTC. We outline the proof below; for more details, see the original derivation in [GCP16].…”
Section: Semantic Secrecy Via Soft-coveringmentioning
confidence: 99%
“…An extension of wiretap channel II was considered recently in [21,22]. The source message was encoded into the digital sequence X N and transmitted to the legitimate receiver via a DMC.…”
Section: Introductionmentioning
confidence: 99%
“…A pair of inner-outer bounds was given in [21], while the secrecy capacity with respect to the semantic secrecy criterion was established in [22]. The coding scheme in [21] was based on that developed by Ozarow and Wyner in [14], while the scheme in [22] was by Wyner's soft covering lemma. He et al considered another extension of wiretap channel II in [23].…”
Section: Introductionmentioning
confidence: 99%