Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels

Shannon's secrecy system is studied in a setting, where both the legitimate decoder and the wiretapper have access to side information sequences correlated to the source, but the wiretapper receives both the coded information and the side information via channels that are more noisy than the respective channels of the legitimate decoder, which in turn, also shares a secret key with the encoder. A single-letter characterization is provided for the achievable region in the space of five figures of merit: the equivocation at the wiretapper, the key rate, the distortion of the source reconstruction at the legitimate receiver, the bandwidth expansion factor of the coded channels, and the average transmission cost (generalized power). Beyond the fact that this is an extension of earlier studies, it also provides a framework for studying fundamental performance limits of systematic codes in the presence of a wiretap channel. The best achievable performance of systematic codes is then compared to that of a general code in several respects, and a few examples are given.

[1]  A. J. Han Vinck,et al.  An achievable region for the Gaussian wiretap channel with side information , 2006, IEEE Transactions on Information Theory.

[2]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[3]  Chaichana Mitrpant Information hiding: an application of wiretap channels with side information , 2003 .

[4]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[5]  Hirosuke Yamamoto Coding theorem for secret sharing communication systems with two noisy channels , 1989, IEEE Trans. Inf. Theory.

[6]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[7]  Shlomo Shamai,et al.  Systematic Lossy Source/Channel Coding , 1998, IEEE Trans. Inf. Theory.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[10]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[11]  Hirosuke Yamamoto Rate-distortion theory for the Shannon cipher system , 1997, IEEE Trans. Inf. Theory.

[12]  Neri Merhav On joint coding for watermarking and encryption , 2006, IEEE Transactions on Information Theory.

[13]  M. van Dijk Broadcast channels with confidential messages, with tampering : the binary symmetric case , 1994 .

[14]  Neri Merhav Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels , 2008, IEEE Transactions on Information Theory.