Secured erasure broadcast channels with state feedback: An arbitrarily number of colluding receivers

Mari Kobayashi, Sheng Yang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we study the secure communication in a K-user erasure broadcast channel (EBC) with state feedback. Assuming that each message must be kept secret to a set of J colluding receivers, we present an achievable rate region as a function of J = 1,..., K - 1. Similarly to the case J = K - 1 studied in the literature, our proposed scheme consists of three phases: initial secret key generation (phase 0), encrypted broadcasting (phase 1), and multicasting (phase 2). However, with J < K - 1, we show that a larger number of secret keys can be generated by smartly combining and reusing packets overheard during phases 0 and 1. Interestingly, it is found that the sum secrecy rate scales with the number of users only if the number of colluding receivers J remains constant.

Original languageEnglish
Title of host publication2016 9th International Symposium on Turbo Codes and Iterative Information Processing
Subtitle of host publicationPaths to 5G and Beyond, ISTC 2016
PublisherIEEE Computer Society
Pages390-394
Number of pages5
ISBN (Electronic)9781509034017
DOIs
StatePublished - 17 Oct 2016
Externally publishedYes
Event9th International Symposium on Turbo Codes and Iterative Information Processing, ISTC 2016 - Brest, France
Duration: 5 Sep 20169 Sep 2016

Publication series

NameInternational Symposium on Turbo Codes and Iterative Information Processing, ISTC
Volume2016-October
ISSN (Print)2165-4700
ISSN (Electronic)2165-4719

Conference

Conference9th International Symposium on Turbo Codes and Iterative Information Processing, ISTC 2016
Country/TerritoryFrance
CityBrest
Period5/09/169/09/16

Fingerprint

Dive into the research topics of 'Secured erasure broadcast channels with state feedback: An arbitrarily number of colluding receivers'. Together they form a unique fingerprint.

Cite this