Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Secret Communication Over Broadcast Erasure Channels With State-Feedback
 
research article

Secret Communication Over Broadcast Erasure Channels With State-Feedback

Czap, Laszlo
•
Prabhakaran, Vinod M.
•
Fragouli, Christina  
Show more
2015
Ieee Transactions On Information Theory

We consider a 1-to-K communication scenario, where a source transmits private messages to K receivers through a broadcast erasure channel, and the receivers feedback strictly, causally, and publicly their channel states after each transmission. We explore the achievable rate region when we require that the message to each receiver remains secret-in the information theoretical sense-from all the other receivers. We characterize the capacity of secure communication in all the cases where the capacity of the 1-to-K communication scenario without the requirement of security is known. As a special case, we characterize the secret-message capacity of a single receiver point-to-point erasure channel with public state-feedback in the presence of a passive eavesdropper. We find that in all the cases where we have an exact characterization, we can achieve the capacity using linear complexity two-phase schemes: in the first phase, we create appropriate secret keys, and in the second phase, we use them to encrypt each message. We find that the amount of key we need is smaller than the size of the message, and equal to the amount of encrypted message the potential eavesdroppers jointly collect. Moreover, we prove that a dishonest receiver that provides deceptive feedback cannot diminish the rate experienced by the honest receivers. We also develop a converse proof which reflects the two-phase structure of our achievability scheme. As a side result, our technique leads to a new outer bound proof for the nonsecure communication problem.

  • Details
  • Metrics
Type
research article
DOI
10.1109/Tit.2015.2449838
Web of Science ID

WOS:000360015900016

Author(s)
Czap, Laszlo
Prabhakaran, Vinod M.
Fragouli, Christina  
Diggavi, Suhas N.  
Date Issued

2015

Publisher

Ieee-Inst Electrical Electronics Engineers Inc

Published in
Ieee Transactions On Information Theory
Volume

61

Issue

9

Start page

4788

End page

4808

Subjects

Data security

•

encoding

•

network coding

•

telecommunication security

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LICOS  
Available on Infoscience
September 28, 2015
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/118720
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés