Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel

Abstract In a typical secure communication system, messages undergo two different encodings: an error-correcting code is applied at the physical layer to ensure correct reception by the addressee (integrity), while at an upper protocol layer cryptography is leveraged to enforce secrecy with respect to eavesdroppers (confidentiality). All constructive solutions proposed so far to concurrently achieve both integrity and confidentiality at the physical layer, aim at meeting the secrecy capacity of the channel, i.e., at maximizing the rate of the code while guaranteeing an asymptotically small information leakage. In this paper, we propose a viable encoding scheme that, to the best of our knowledge, is the first one to guarantee both perfect secrecy (i.e., no information leakage) and reliable communication over the generalized Ozarow-Wyner’s wire-tap channel. To this end, we first introduce a metric called uncertainty rate that, similarly to the equivocation rate metric, captures the amount of information leaked by a coding scheme in the considered threat model, but it is simpler to apply in the context of linear codes. Based on this metric, we provide an alternative and simpler proof of the known result that no linear error-correcting code alone can achieve perfect secrecy. Finally, we propose a constructive solution combining secret sharing and linear error-correcting codes, and we show that our solution provides the desired combination of reliable and perfectly secret communication. The provided solution, other than being supported by thorough analysis, is viable in practical communication systems.

[1]  Ling Liu,et al.  Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices , 2015, IEEE Transactions on Information Theory.

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Pablo Piantanida,et al.  Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels , 2014, IEEE Transactions on Information Theory.

[4]  James S. Plank,et al.  AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.

[5]  Kenneth W. Shum,et al.  Imperfect secrecy in wiretap channel II , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[6]  Shlomo Shamai,et al.  An Information Theoretic Approach to Secret Sharing , 2015, IEEE Transactions on Information Theory.

[7]  H. Vincent Poor,et al.  Generalized Multiple Access Channels with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.

[8]  Reihaneh Safavi-Naini,et al.  A Model for Adversarial Wiretap Channels , 2016, IEEE Transactions on Information Theory.

[9]  John M. Shea,et al.  LDPC code design for the BPSK-constrained Gaussian wiretap channel , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[10]  H. Vincent Poor,et al.  On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[12]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[13]  Matthieu R. Bloch,et al.  The Anti-Diversity Concept for Secure Communication on a Two-Link Compound Channel , 2014 .

[14]  Mahdi Cheraghchi,et al.  Invertible extractors and wiretap protocols , 2009, 2009 IEEE International Symposium on Information Theory.

[15]  Amit Sahai,et al.  On Perfect and Adaptive Security in Exposure-Resilient Cryptography , 2001, EUROCRYPT.

[16]  Ronald L. Rivest,et al.  All-or-Nothing Encryption and the Package Transform , 1997, FSE.

[17]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[18]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[19]  Alexander Barg,et al.  Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component , 2015, ITW.

[20]  Masahide Sasaki,et al.  Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint , 2013, IEEE Transactions on Information Theory.

[21]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[22]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[23]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[24]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[25]  Steven W. McLaughlin,et al.  Physical-Layer Security: Combining Error Control Coding and Cryptography , 2009, 2009 IEEE International Conference on Communications.

[26]  Ivan Damgård,et al.  Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions , 2015, EUROCRYPT.

[27]  Marco Baldi,et al.  Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[28]  Andrew Thangaraj,et al.  Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.

[29]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[30]  U. Maurer The Strong Secret Key Rate of Discrete Random Triples , 1994 .

[31]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[32]  Alexander Vardy,et al.  Semantic Security for the Wiretap Channel , 2012, CRYPTO.

[33]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[34]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[35]  Aylin Yener,et al.  Wiretap channel II with a noisy main channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[36]  I. G. Núñez,et al.  Generalized Hamming Weights for Linear Codes , 2001 .

[37]  Mohamed-Slim Alouini,et al.  On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.

[38]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[39]  Mahdi Cheraghchi,et al.  Invertible Extractors and Wiretap Protocols , 2012, IEEE Trans. Inf. Theory.

[40]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.