Some optimization problems in error free perfect secrecy systems

Wireless physical layer security has attracted a considerable recent attention. One of the approaches for generating secret keys among different users is by using some physical properties of wireless networks. Since secret keys are valuable resources, how to efficiently use a key to achieve perfect secrecy is as important as how to generate a key. The flexibility to control the size of cipher-text is also important in wireless networks due to the possible asymmetric channel capacities among different links in networks. Recently, Ho et al. have demonstrated the existence of a fundamental trade-off between the expected key consumption and the size of cipher-text. It is important to find the optimal coding scheme which can achieve the trade- off. With the help of an algorithm proposed in this paper, to design the optimal coding scheme is equivalent to solving an optimization problem. Some optimization problems for security systems satisfying different requirements are formulated. This paper also shows a necessary condition for achieving the minimal initial key requirement and the minimal size of cipher-text.

[1]  H. Vincent Poor,et al.  A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.

[2]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[3]  Terence Chan,et al.  Design of error-free perfect secrecy system by prefix codes and partition codes , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[4]  I. Olkin,et al.  Inequalities: Theory of Majorization and Its Applications , 1980 .

[5]  Raymond W. Yeung,et al.  Information Theory and Network Coding , 2008 .

[6]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[7]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[8]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[11]  G. S. Vernam Cipher printing telegraph systems: For secret wire and radio telegraphic communications , 2022, Journal of the A.I.E.E..

[12]  Stark C. Draper,et al.  Minimum energy per bit for secret key acquisition over multipath wireless channels , 2009, 2009 IEEE International Symposium on Information Theory.

[13]  Siu-Wai Ho,et al.  Error-free perfect-secrecy systems , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[14]  Mamoru Hoshi,et al.  Interval algorithm for random number generation , 1997, IEEE Trans. Inf. Theory.

[15]  Sergio Verdú,et al.  On the Interplay Between Conditional Entropy and Error Probability , 2010, IEEE Transactions on Information Theory.