Title :
Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II
Author :
Won Taek Song ; Jinho Choi ; Jeongseok Ha
Author_Institution :
Dept. of Electr. Eng., Korea Adv. Inst. of Sci. & Technol., Daejeon, South Korea
Abstract :
We introduce a binary erasure wiretap channel of type II in which the number of eavesdropped bits μ becomes available a posteriori. We aim at achieving perfect secrecy over such a channel model. The most appropriate application is a secret key agreement scheme. We present a secret key agreement scheme that adopts the formulation S = HX of Wyner-Ozarows´s linear coset coding. The scheme is based on the following simple observation: even if some information on a secret message leaked out, I(S; Xμ) >; 0, where Xμ is a binary sequence of length μ, it is still possible to have perfect secrecy I(SJ; Xμ) = 0 for some subsequence SJ of S. Our secret key agreement scheme achieves perfect secrecy by taking only those subsequences SJ that are independent of the eavesdropped bits Xμ. Our secret key agreement scheme naturally leads to defining a security measure DH(μ) for parity-check matrices such that the eavesdropper gets zero information on SJ as long as the length of SJ is less than DH(μ). We study basic properties of DH(μ) and prove the perfect secrecy of our key agreement scheme. For parity-check matrices of small sizes, we perform an exhaustive search for matrices maximizing DH(μ).
Keywords :
binary sequences; linear codes; matrix algebra; search problems; telecommunication security; wireless channels; Wyner-Ozarows linear coset coding; binary sequence; channel model; eavesdropped bits; exhaustive search; parity-check matrices; perfect secrecy over binary erasure wiretap channel; secret key agreement scheme; Cost function; DH-HEMTs; Encoding; Parity check codes; Security; Vectors; Coset code; key rate; security measure; wiretap channel;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2199629