4.5 Article

Sufficiently Myopic Adversaries Are Blind

Journal

IEEE TRANSACTIONS ON INFORMATION THEORY
Volume 65, Issue 9, Pages 5718-5736

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIT.2019.2916590

Keywords

Arbitrarily varying channels; myopic jamming; information theoretic secrecy

Funding

  1. Bharti Centre for Communication, IIT Bombay
  2. Department of Science and Technology, Government of India
  3. ITRA, Government of India
  4. University Grants Committee of the Hong Kong, China [AoE/E-02/08]
  5. Innovation Technology Fund (ITF) [ITS/143/14FP]
  6. Innovation Technology Commission, Government of Hong Kong
  7. GRF [14313116]
  8. NSF [1321129]
  9. Division of Computing and Communication Foundations
  10. Direct For Computer & Info Scie & Enginr [GRANTS:13949882, 1321129] Funding Source: National Science Foundation

Ask authors/readers for more resources

We consider a communication problem in which a sender, Alice, wishes to communicate with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is myopic. Specifically, for blocklength n, the codeword X-n transmitted by Alice is corrupted by James who must base his adversarial decisions (of which locations of X-n to corrupt and how to corrupt them) on the non-causal observation Z(n) of X-n obtained through a noisy memoryless channel. More specifically, our communication model may be described by two channels. A memoryless channel p(Z vertical bar X) from Alice to James, and an arbitrarily varying channel from Alice to Bob, p(Y vertical bar XS) governed by a state S-n determined by James. In standard adversarial channels, the states S-n may depend on the codeword X-n, but in our setting S-n depends non-causally only on James's view Z(n). We present upper and lower bounds on the capacity of myopic channels. For a number of special cases of interest we show that our bounds are tight. We then extend our results to the setting of secure communication, in which we require that the transmitted message remains secret from James. For example, we show that if 1i) James may flip at most a p fraction of the bits communicated between Alice and Bob and 2) James views X-n through a binary symmetric channel with crossover probability q, then once James is sufficiently myopic (in this case, when p < 0.5 and H(q) > H(p)), then the optimal communication rate is that of an adversary who is blind (that is, an adversary that does not have any knowledge of X-n at all), which is 1-H(p) for standard communication, and H(q)-H(p) for secure communication. A similar phenomenon exists for more general models of communication.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available