Semantic-security capacity for wiretap channels of type II

The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its semantic-security (SS) capacity. In this setting, the legitimate users communicate via a discrete-memoryless (DM) channel in the presence of an eavesdropper that has perfect access to a subset of its choosing of the transmitted symbols, constrained to a fixed fraction of the blocklength. The secrecy criterion is achieved simultaneously for all possible eavesdropper subset choices. On top of that, SS requires negligible mutual information between the message and the eavesdropper's observations even when maximized over all message distributions. A key tool for the achievability proof is a novel and stronger version of Wyner's soft covering lemma. Specifically, the lemma shows that a random codebook achieves the soft-covering phenomenon with high probability. The probability of failure is doubly-exponentially small in the blocklength. Since the combined number of messages and subsets grows only exponentially with the blocklength, SS for the WTC II is established by using the union bound and invoking the stronger soft-covering lemma. The direct proof shows that rates up to the weak-secrecy capacity of the classic WTC with a DM erasure channel (EC) to the eavesdropper are achievable. The converse follows by establishing the capacity of this DM wiretap EC as an upper bound for the WTC II.

[1]  Paul W. Cuff,et al.  Soft covering with high probability , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[2]  Himanshu Tyagi,et al.  Semantically-Secure Coding Scheme Achieving the Capacity of a Gaussian Wiretap Channel , 2014, ArXiv.

[3]  A. Robert Calderbank,et al.  Wiretap channel type II with an active eavesdropper , 2009, 2009 IEEE International Symposium on Information Theory.

[4]  Cong Ling,et al.  Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.

[5]  Matthieu R. Bloch,et al.  Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.

[6]  Masahito Hayashi,et al.  General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel , 2006, IEEE Transactions on Information Theory.

[7]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Mihir Bellare,et al.  Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity , 2012, IACR Cryptol. ePrint Arch..

[10]  Kefei Chen,et al.  Some new characters on the wire-tap channel of type II , 2005, IEEE Transactions on Information Theory.

[11]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[12]  Mihir Bellare,et al.  A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[13]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[14]  Mark M. Wilde,et al.  Quantum Information Theory , 2013 .

[15]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[16]  Aylin Yener,et al.  Wiretap channel II with a noisy main channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[17]  Sergio Verdú,et al.  Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.

[18]  Paul W. Cuff,et al.  Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.

[19]  Alexander Vardy,et al.  A Cryptographic Treatment of the Wiretap Channel , 2012, IACR Cryptol. ePrint Arch..

[20]  Rudolf Ahlswede,et al.  Strong converse for identification via quantum channels , 2000, IEEE Trans. Inf. Theory.

[21]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[22]  Paul W. Cuff,et al.  The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List , 2014, IEEE Transactions on Information Theory.

[23]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[24]  M. Wilde Quantum Information Theory: Noisy Quantum Shannon Theory , 2013 .

[25]  Aaron D. Wyner,et al.  The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.

[26]  Gerhard Kramer,et al.  Informational divergence approximations to product distributions , 2013, 2013 13th Canadian Workshop on Information Theory.

[27]  H. Vincent Poor,et al.  A rate-distortion based secrecy system with side information at the decoders , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[28]  H. Vincent Poor,et al.  The likelihood encoder for lossy source compression , 2014, 2014 IEEE International Symposium on Information Theory.

[29]  Masahito Hayashi,et al.  Secure multiplex coding with dependent and non-uniform multiple messages , 2012, Allerton Conference.

[30]  H. Vincent Poor,et al.  Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.

[31]  Andreas J. Winter,et al.  Secret, public and quantum correlation cost of triples of random variables , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[32]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[33]  Masahito Hayashi,et al.  Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification , 2009, IEEE Transactions on Information Theory.

[34]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[35]  Paul W. Cuff,et al.  Rate-distortion theory for secrecy systems , 2013, 2013 IEEE International Symposium on Information Theory.

[36]  Miodrag J. Mihaljevic On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II , 1993, Error Control, Cryptology, and Speech Compression.

[37]  R. Schumann Quantum Information Theory , 2000, quant-ph/0010060.

[38]  H. Vincent Poor,et al.  The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.

[39]  I. G. Núñez,et al.  Generalized Hamming Weights for Linear Codes , 2001 .