4.6 Article

Encoding Individual Source Sequences for the Wiretap Channel

期刊

ENTROPY
卷 23, 期 12, 页码 -

出版社

MDPI
DOI: 10.3390/e23121694

关键词

wiretap channel; physical layer security; semantic security; individual sequence; finite-state machine; Lempel-Ziv algorithm; side information

向作者/读者索取更多资源

In this study, we address the problem of encoding a deterministic source sequence for the degraded wiretap channel using finite-state machines as encoder and decoder. A necessary condition for reliable and secure transmission is presented, along with a lower bound on the smallest achievable bandwidth expansion factor. The bound is achievable through Lempel-Ziv compression and good channel coding, and a lower bound on the minimum necessary rate of purely random bits needed for security is also derived.
We consider the problem of encoding a deterministic source sequence (i.e., individual sequence) for the degraded wiretap channel by means of an encoder and decoder that can both be implemented as finite-state machines. Our first main result is a necessary condition for both reliable and secure transmission in terms of the given source sequence, the bandwidth expansion factor, the secrecy capacity, the number of states of the encoder and the number of states of the decoder. Equivalently, this necessary condition can be presented as a converse bound (i.e., a lower bound) on the smallest achievable bandwidth expansion factor. The bound is asymptotically achievable by Lempel-Ziv compression followed by good channel coding for the wiretap channel. Given that the lower bound is saturated, we also derive a lower bound on the minimum necessary rate of purely random bits needed for local randomness at the encoder in order to meet the security constraint. This bound too is achieved by the same achievability scheme. Finally, we extend the main results to the case where the legitimate decoder has access to a side information sequence, which is another individual sequence that may be related to the source sequence, and a noisy version of the side information sequence leaks to the wiretapper.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据