Title :
How to use independent secret keys for secure broadcasting of common messages
Author :
Rafael F. Schaefer;Ashish Khisti;H. Vincent Poor
Author_Institution :
Department of Electrical Engineering, Princeton University, NJ 08544, USA
fDate :
6/1/2015 12:00:00 AM
Abstract :
The broadcast channel with independent secret keys is studied. In this scenario, a common message has to be securely broadcast to two legitimate receivers in the presence of an eavesdropper. The transmitter shares with each legitimate receiver an independent secret key of arbitrary rate. These keys can either be used as one-time pads to encrypt the common message or can be interpreted as fictitious messages used as randomization resources for wiretap coding. Both approaches are discussed and the secrecy capacity is derived for various cases. Depending on the qualities of the legitimate and eavesdropper channels, either a one-time pad, wiretap coding, or a combination of both turns out to be capacity-achieving.
Keywords :
"Receivers","Encoding","Decoding","Zinc","Cryptography","Transmitters"
Conference_Titel :
Information Theory (ISIT), 2015 IEEE International Symposium on
Electronic_ISBN :
2157-8117
DOI :
10.1109/ISIT.2015.7282800