Abstract
The problem of secure broadcasting with independent secret keys is studied. The particular scenario is analyzed where a common message has to be broadcasted to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers, which can be used in different ways: They can be used as one-time pads to encrypt the common message or they can be used as randomization resources for wiretap coding. Both approaches are studied in this paper. If both legitimate channels are degraded versions of the eavesdropper channel, it is shown that the one-time pad approach is optimal for several cases yielding corresponding capacity expressions. Reversely, the wiretap coding approach is shown to be optimal if the eavesdropper channel is degraded with respect to both legitimate channels establishing capacity in this case as well.
Original language | English |
---|---|
DOIs | |
State | Published - 2014 |
Externally published | Yes |
Event | 2014 48th Annual Conference on Information Sciences and Systems, CISS 2014 - Princeton, NJ, United States Duration: 19 Mar 2014 → 21 Mar 2014 |
Conference
Conference | 2014 48th Annual Conference on Information Sciences and Systems, CISS 2014 |
---|---|
Country/Territory | United States |
City | Princeton, NJ |
Period | 19/03/14 → 21/03/14 |