Arbitrarily varying wiretap channels with finite coordination resources

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

The wiretap channel models secure communication in the presence of a non-legitimate eavesdropper who has to be kept ignorant. In this paper, the arbitrarily varying wiretap channel (AVWC) is studied, in which the channel to both legitimate receiver and eavesdropper may vary in an unknown and arbitrary manner from channel use to channel use. It has been shown that for AVCs coordination between the transmitter and legitimate receiver based on common randomness (CR) is indispensable for reliable communication. Approaches taken so far yield CR-assisted strategies where the needed amount of CR increases unbounded with the block length. In this paper, it is shown that if we allow for a small but non-vanishing average probability of error and information leakage (in terms of weak secrecy), the amount of CR is always finite and independent of the block length. The corresponding secrecy capacity equals the one with asymptotically vanishing performance requirements. Furthermore, it is shown that the average decoding error at the eavesdropper can be made arbitrarily close to 1 regardless of the applied decoding strategy.

Original languageEnglish
Title of host publication2014 IEEE International Conference on Communications Workshops, ICC 2014
PublisherIEEE Computer Society
Pages746-751
Number of pages6
ISBN (Print)9781479946402
DOIs
StatePublished - 2014
Event2014 IEEE International Conference on Communications Workshops, ICC 2014 - Sydney, NSW, Australia
Duration: 10 Jun 201414 Jun 2014

Publication series

Name2014 IEEE International Conference on Communications Workshops, ICC 2014

Conference

Conference2014 IEEE International Conference on Communications Workshops, ICC 2014
Country/TerritoryAustralia
CitySydney, NSW
Period10/06/1414/06/14

Fingerprint

Dive into the research topics of 'Arbitrarily varying wiretap channels with finite coordination resources'. Together they form a unique fingerprint.

Cite this