Wiretap Channel with Side Information from Part of Encoder

The wiretap channel put forward by A.D. Wyner and the wiretap channel of type II provided by A.D. Wyner and L. H. Oz arow play important roles in network communication and security. In this paper, we consider the situation that a wiretapper can not only tap the main channel output via a noisy wiretap channel, but also get someside information from part of encoder, i.e., some transmitted symbols of the output of the encoder. In other words, the new model of this paper is a combination of the wiretap channel and the wiretap channel of type II. The new model of this paper is different from I. Csiszar and J. Korner 's model [CK], it is also different from N. Merhav's model [Me]. A single-letter characterization is provided for a region composed of all achievable triples: the equivocation to the wiretapper, the reliable transmission rate of the main channel, the ratio of the leaked transmitted symbols. In particular, if the equivocation to the wiretapper is equal to the entropy of the data symbols, then we say that the transmission is accomplished in perfect secrecy. Our results imply in which cases (of the ratio of the leaked transmitted symbols), there may exist a C's>0, such that reliable transmission at rates up to C's is in perfect secrecy.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  A. J. Han Vinck,et al.  Wiretap Channel With Side Information , 2006, IEEE Transactions on Information Theory.

[3]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[4]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[5]  M. van Dijk Broadcast channels with confidential messages, with tampering : the binary symmetric case , 1994 .

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  A. J. Han Vinck,et al.  An achievable region for the Gaussian wiretap channel with side information , 2006, IEEE Transactions on Information Theory.

[8]  Neri Merhav Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels , 2008, IEEE Transactions on Information Theory.

[9]  I. G. Núñez,et al.  Generalized Hamming Weights for Linear Codes , 2001 .

[10]  Kefei Chen,et al.  Some new characters on the wire-tap channel of type II , 2005, IEEE Transactions on Information Theory.