On the role of feedback in two-way secure communication

For bi-directional communication, the most general form of encoders should consider the signals received in the past as inputs. However, in practice, it would also be highly desirable if feedback could be ignored for encoding purposes since this would lead to a simple system design. In this work, we investigate the question of whether and how much loss in secrecy rate would be incurred, if such an approach were taken. To do so, we investigate the role of feedback in secrecy for two three-node two-way channel models. First, we show that feedback is indeed useful for a class of full-duplex two-way wire-tap channels. In this case, when feedback is ignored, the channel is equivalent to a Gaussian degraded relay channel with confidential messages to the relay. The usefulness of feedback is demonstrated by deriving an upper bound for this channel when feedback is ignored, and then proving that, when feedback is used, a secrecy rate higher than this upper bound is achievable. Secondly, we consider the half-duplex Gaussian two-way relay channel where there is an eavesdropper co-located with the relay node, and find that the impact of feedback is less pronounced compared to the previous scenario. Specifically, the loss in secrecy rate, when ignoring the feedback, is quantified to be less than 0.5 bit per channel use when the power of the relay goes to infinity. We also show that this rate region is achievable under a simple time sharing scheme with cooperative jamming, which, with its simplicity and near-optimum performance, is a viable alternative to an encoder using feedback.

[1]  Michael Gastpar,et al.  The case for structured random codes in network capacity theorems , 2008, Eur. Trans. Telecommun..

[2]  Matthieu R. Bloch,et al.  Channel scrambling for secrecy , 2009, 2009 IEEE International Symposium on Information Theory.

[3]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[4]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[5]  Venkat Anantharam,et al.  Information-theoretic key agreement of multiple terminal: part II: channel model , 2010, IEEE Trans. Inf. Theory.

[6]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[7]  Muriel Médard,et al.  Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.

[8]  Imre Csiszár,et al.  Secrecy generation for multiple input multiple output channel models , 2009, 2009 IEEE International Symposium on Information Theory.

[9]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[10]  Te Sun Han,et al.  A general coding scheme for the two-way channel , 1984, IEEE Trans. Inf. Theory.

[11]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[12]  Claude E. Shannon,et al.  Two-way Communication Channels , 1961 .

[13]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[14]  Ender Tekin,et al.  Achievable Rates for Two-Way Wire-Tap Channels , 2007, 2007 IEEE International Symposium on Information Theory.

[15]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[16]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[17]  George T. Amariucai,et al.  Secrecy rates of binary wiretapper channels using feedback schemes , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[18]  Vinod M. Prabhakaran,et al.  Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.

[19]  Gunter Dueck The Capacity Region of the Two-Way Channel Can Exceed the Inner Bound , 1979, Inf. Control..

[20]  Massimo Franceschetti,et al.  Wiretap channel with rate-limited feedback , 2008, 2008 IEEE International Symposium on Information Theory.