Abstract
The broadcast channel with confidential messages (BCC) models the communication scenario in which a transmitter sends simultaneously common and confidential information to two receivers. The common information must be received by both receivers while the confidential information is designated for one receiver only and must be secured against the other one. The performance of this system is usually characterized by its secrecy capacity region determining the maximum transmission rates. In this chapter, the issue of whether this secrecy capacity region depends continuously on the system parameters or not is examined. In particular, this is done for compound channels, in which the users know only that the true channel realization is constant for the whole duration of transmission and this comes from a pre-specified uncertainty set. The secrecy capacity region of the compound BCC is shown to be robust in the sense that it is a continuous function of the uncertainty set. This means that small variations in the uncertainty set result in small variations in secrecy capacity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note that the distance can also be defined based on another norm. This follows from the fact that the output alphabets \(\mathscr {Y}\) and \(\mathscr {Z}\) are finite. A norm other than the total variation distance would only result in slightly different constants.
References
Ahlswede R (1978) Elimination of correlation in random codes for arbitrarily varying channels. Z Wahrscheinlichkeitstheorie verw Gebiete 44:159–175
Alicki R, Fannes M (2004) Continuity of quantum conditional information. J Phys A: Math Gen 37(5):L55–L57
Bjelaković I, Boche H, Sommerfeld J (2013) Capacity results for arbitrarily varying wiretap channels. Information theory, combinatorics, and search theory. Springer, Berlin, pp 123–144
Bjelaković I, Boche H, Sommerfeld J (2013) Secrecy results for compound wiretap channels. Prob Inf Trans 49(1):73–98
Blackwell D, Breiman L, Thomasian AJ (1959) The capacity of a class of channels. Ann Math Stat 30(4):1229–1241
Blackwell D, Breiman L, Thomasian AJ (1960) The capacities of certain channel classes under random coding. Ann Math Stat 31(3):558–567
Bloch M, Barros J (2011) Physical-layer security: from information theory to security engineering. Cambridge University Press, Cambridge
Boche H, Schaefer RF (2013) Capacity results and super-activation for wiretap channels with active wiretappers. IEEE Trans Inf Forensics Secur 8(9):1482–1496
Boche H, Schaefer RF (2014) Arbitrarily varying wiretap channels with finite coordination resources. In Proceedings of IEEE international conference on communication workshops, Sydney, Australia, pp 746–751
Boche H, Schaefer RF, Poor HV (2014) On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels. IEEE Trans Inf Forensics Secur. http://arxiv.org/abs/1409.4752
Boche H, Schaefer RF, Poor HV (2015) On the continuity of the secrecy capacity of wiretap channels under channel uncertainty. In: Proceedings of IEEE international conference on communication, London, UK, June 2015
Boche H, Schaefer RF, Poor HV (2014) On arbitrarily varying wiretap channels for different classes of secrecy measures. In: Proceedings of IEEE international symposium on information theory, Honolulu, pp 2376–2380
Csiszár I (1996) Almost independence and secrecy capacity. Probl Pered Inf 32(1):48–57
Csiszár I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans inf theory 24(3):339–348
Csiszár I, Narayan P (1988) The capacity of the arbitrarily varying channel revisited: positivity, constraints. IEEE Trans Inf Theory 34(2):181–193
Deutsche Telekom AG Laboratories (2010) Next generation mobile networks: (r)evolution in mobile communications. Technology Radar Edition III/2010, Feature Paper
Ekrem E, Ulukus S (2010) On Gaussian MIMO compound wiretap channels. In: Proceedings of the conference on information sciences and systems, Baltimore, pp 1–6
Fettweis G, Boche H, Wiegand T et al (2014) The tactile internet. Technical report, ITU-T Technology Watch reports. http://www.itu.int/oth/T2301000023/en
Grigorescu A (2015) Robust biometric authentication and secure message transmission. Master’s thesis, Technische Universität München, Munich, Germany
Grigorescu A, Boche H, Schaefer RF, Poor HV (2015) Capacity region continuity of the compound broadcast channel with confidential messages. In: Proceedings of IEEE conference on information theory workshop, Jerusalem, Israel
Helmbrecht U, Plaga R (2008) New challenges for IT-security research in ICT. In: World federation of scientists international seminars on planetary emergencies, Erice, Italy, pp 1–6
Jorswieck EA, Wolf A, Gerbracht S (2010) Secrecy on the physical layer in wireless networks. Trends in Telecommunications Technologies, pp 413–435
Khisti A (2011) Interference alignment for the multiantenna compound wiretap channel. IEEE Trans Inf Theory 57(5):2976–2993
Kobayashi M, Liang Y, Shamai (Shitz) S, Debbah M (2009) On the compound MIMO broadcast channels with confidential messages. In: Proceedings of IEEE international symposium on information theory, Seoul, Korea, pp 1283–1287
Leung D, Smith G (2009) Continuity of quantum channel capacities. Commun Math Phys 292(1):201–215
Liang Y, Kramer G, Poor HV, Shamai (Shitz) S (2009) Compound wiretap channels. EURASIP J Wireless Commun 142374:1–13
Liang Y, Poor HV, Shamai (Shitz) S (2009) Information theoretic security. Found Trends Commun Inf Theory 5(4–5):355–580
Liu R, Trappe W (eds) (2010) Securing wireless communications at the physical layer. Springer, Berlin
Maurer UM, Wolf S (2000) Information-theoretic key agreement: from weak to strong secrecy for free. In: EUROCRYPT 2000. Lecture Notes in Computer Science, vol 1807, Springer, Berlin, pp 351–368
MolavianJazi E, Bloch M, Laneman JN (2009) Arbitrary jamming can preclude secure communication. In: Proceedings of the 47th annual Allerton conference on communication, control, computing, Monticello, IL, pp 1069–1075
Nötzel J, Wiese M, Boche H (2015) The arbitrarily varying wiretapchannel—secret randomness, stability and super-activation. IEEE Trans Inf Theory. http://arxiv.org/abs/1501.07439
Schaefer RF, Boche H (2014a) Physical layer service integration in wireless networks—signal processing challenges. IEEE Signal Process Mag 31(3):147–156
Schaefer RF, Boche H (2014b) Robust broadcasting of common and confidential messages over compound channels: strong secrecy and decoding performance. IEEE Trans Inf Forensics Secur 9(10):1720–1732
Schaefer RF, Loyka S (2013) The secrecy capacity of a compound MIMO gaussian channel. In: Proceedings of IEEE conference information theory workshop, Seville, Spain, pp 104–108
Schaefer RF, Loyka S (2014) The compound secrecy capacity of a class of non-degraded MIMO gaussian channels. In: Proceedings of the 52nd annual allerton conference on communication, control, and computing, Monticello, pp. 1004–1010
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Wiese M, Nötzel J, Boche H (2014) The arbitrarily varying wiretap channel-deterministic and correlated random coding capacities under the strong secrecy criterion. IEEE Trans Inf Theory. http://arxiv.org/abs/1410.8078
Wolfowitz J (1960) Simultaneous channels. Arch Rational Mech Anal 4(4):371–386
Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54:1355–1387
Zhou X, Song L, Zhang Y (eds) (2013) Physical layer security in wireless communications. CRC Press, Boca Raton
Acknowledgments
This work of R. F. Schaefer was supported by the German Research Foundation (DFG) under Grant WY 151/2-1. This work of A. Grigorescu was supported by the German Research Foundation (DF) under Grant BO 1734/20-1. This work of H. Boche was supported by the German Ministry of Education and Research (BMBF) under Grants 01BQ1050 and 16KIS0118. This work of H. V. Poor was supported by the U.S. National Science Foundation under Grant CMMI-1435778.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix
Appendix
The following proofs of Lemmas 5.1 and 5.2 are adaptations of [2] and [25] where similar results were proved in the context of quantum information theory. However, we obtain bounds with better constants by restricting the analysis to classical probability distributions only.
5.1.1 Proof of Lemma 5.1
\(\square \)The proof of this lemma can also be found in [10, 11] and is given here for completeness. It follows [2] where a similar result is presented in the context of quantum information. However, we are able to get a better constant by using the fact that \(H(Y|X)\ge 0\) for all \(P_{XY}\in \mathscr {P}(\mathscr {X}\times \mathscr {Y})\). This is in contrast to the quantum version in [2].
Let \(P_{XY},P_{\tilde{X}\tilde{Y}}\in \mathscr {P}(\mathscr {X}\times \mathscr {Y})\) be joint probability distributions with \(\Vert P_{XY}-P_{\tilde{X}\tilde{Y}}\Vert \le \varepsilon \). We assume that
is satisfied with equality since otherwise \(\varepsilon \) in (5.19) could be replaced with a smaller \(\tilde{\varepsilon }<\varepsilon \) accordingly.
We define the function
and set
for all \((x,y)\in \mathscr {X}\times \mathscr {Y}\) so that \(p^*\in \mathscr {P}(\mathscr {X},\mathscr {Y})\) is a joint probability distribution on \(\mathscr {X}\times \mathscr {Y}\).
Further, we set
and
Next we check that \(\hat{p}\) and \(\hat{q}\) are well defined such that they are indeed probability distributions. \(\hat{p}(x,y)\ge 0\) for all \((x,y)\in \mathscr {X}\times \mathscr {Y}\) is obviously true. It remains to verify that \(\hat{q}(x,y)\ge 0\) for all \((x,y)\in \mathscr {X}\times \mathscr {Y}\) is also satisfied.
If \(P_{XY}(x,y)\le P_{\tilde{X}\tilde{Y}}(x,y)\), then
so that \(\hat{q}(x,y)\ge 0\). On the other hand, if \(P_{XY}(x,y)>P_{\tilde{X}\tilde{Y}}(x,y)\), then
so that \(\hat{q}(x,y)\ge 0\) also in this case. From the definition of \(\hat{p}\) and \(\hat{q}\) in (5.21) and (5.19)–(5.20) it can further easily be verified that
which shows that \(\hat{p}\in \mathscr {P}(\mathscr {X}\times \mathscr {Y})\) and \(\hat{q}\in \mathscr {P}(\mathscr {X}\times \mathscr {Y})\) are joint probability distributions.
With this we can rewrite \(p^*\) as
for all \((x,y)\in \mathscr {X}\times \mathscr {Y}\). Next, we show that (5.22a) implies
To do so, we use the fact that the conditional entropy is concave, i.e.,
With this, we have
Using the concavity of the entropy
and the upper bound on the joint entropy
we get
and further
which shows (5.23). (By the same arguments, one can show that (5.22b) implies \(|H(\tilde{Y}|\tilde{X})-H(Y^*|X^*)| \le \varepsilon \log |\mathscr {Y}|+H_2(\varepsilon )\).)
Finally, this yields
which is (5.6), proving the lemma. \(\square \)
5.1.2 Proof of Lemma 5.2
\(\square \)The proof presented in the following is based on [10, Lemma 2]. Let \(0\le k\le n\) be arbitrary. We define
So we have
For all \(0\le k\le n-1\) it holds that
We want to analyze the right-hand side of (5.26). For \(0\le k\le n-1\), it holds that
This shows that the total variation between the joint probability distribution \(P_{\textit{UVY}^k\tilde{Y}_{k+1}^n}\) and \(P_{UVY^{k+1}\tilde{Y}_{k+2}^n}\) is smaller than \(\varepsilon \). Then by Lemma 5.1 it holds that
and
Inserting (5.27) and (5.28) into (5.26) we obtain
This gives in particular the following upper bound for the difference between \(I(V;Y^n|U)\) and \(I(V;\tilde{Y}^n|U)\):
proving the lemma. \(\square \)
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Schaefer, R.F., Grigorescu, A., Boche, H., Poor, H.V. (2016). Broadcast Channels with Confidential Messages: Channel Uncertainty, Robustness, and Continuity. In: Baldi, M., Tomasin, S. (eds) Physical and Data-Link Security Techniques for Future Communication Systems. Lecture Notes in Electrical Engineering, vol 358. Springer, Cham. https://doi.org/10.1007/978-3-319-23609-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-23609-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23608-7
Online ISBN: 978-3-319-23609-4
eBook Packages: EngineeringEngineering (R0)