Next Article in Journal
Chaotic Map with No Fixed Points: Entropy, Implementation and Control
Next Article in Special Issue
Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities
Previous Article in Journal
Bipartite Structures in Social Networks: Traditional versus Entropy-Driven Analyses
Previous Article in Special Issue
Attack Algorithm for a Keystore-Based Secret Key Generation Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter

1
School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China
2
School of Economics and Management, Chengdu Textile College, Chengdu 611731, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2019, 21(3), 278; https://doi.org/10.3390/e21030278
Submission received: 29 December 2018 / Revised: 23 February 2019 / Accepted: 9 March 2019 / Published: 13 March 2019
(This article belongs to the Special Issue Information-Theoretic Security II)

Abstract

:
In this paper, we propose two feedback coding schemes for the action-dependent wiretap channel with noncausal state at the transmitter. The first scheme follows from the already existing secret key based feedback coding scheme for the wiretap channel. The second one follows from our recently proposed hybrid feedback scheme for the wiretap channel. We show that, for the action-dependent wiretap channel with noncausal state at the transmitter, the second feedback scheme performs better than the first one, and the capacity results of this paper are further explained via a Gaussian example, which we call the action-dependent dirty paper wiretap channel with noiseless feedback.

1. Introduction

Using channel feedback to enhance the physical layer security (PLS) of a communication system was first proposed by Ahlswede and Cai [1], who re-visited the foundation of the PLS—the wiretap channel model [2]—by considering a noiseless feedback channel from the legitimate receiver to the transmitter. Ahlswede et al. [1] showed that, since the eavesdropper does not know the feedback, the legitimate receiver’s feedbackcan be used to generate secret keys shared between the transmitter and the legitimate receiver, and these keys can be used to encrypt the transmitted message. Using the feedback scheme in [1], it has been shown that the secrecy capacity (channel capacity with perfect secrecy constraint) of the wiretap channel can be enhanced. Furthermore, Ahlswede et al. [1] showed that this usage of feedback is optimal (achieving the secrecy capacity of the wiretap channel with noiseless feedback) if the channel is physically degraded (the eavesdropper’s received signal is a degraded version of the legitimate receiver’s). In recognition of this, Ardestanizadeh et al. [3] further pointed out that, if the noiseless feedback channel can be used to transmit anything the legitimate parties wish, the best choice of the legitimate parties is to send pure random bits (secret key) over the feedback channel. Subsequently, Schaefer et al. [4] extended the work of [3] to a broadcast situation, where two legitimate receivers of the broadcast channel independently send their secret keys to the transmitter via two noiseless feedback channels, and these keys help to enhance the achievable secrecy rate region of the broadcast wiretap channel [5]. Other related works in the PLS of the feedback channels include those by [6,7,8], who introduced channel state information (CSI) into various feedback channel models. Recently, Dai et al. [9] showed that, for the general wiretap channel (without physically degraded assumption), a better usage of the feedback is to generate not only key but also cooperative message from it, and this cooperative message helps the legitimate receiver to improve his decoding performance. Dai et al. [9] showed that this new feedback scheme achieves a larger achievable secrecy rate than the already existing secret key based feedback scheme [1] does.
Channel with noncausal state at the transmitter was first investigated by [10], and the capacity of this channel model was found by [11]. Subsequently, Costa et al. [12] studied the Gaussian case in [11], which is known as the dirty paper channel, and showed that the capacity of the dirty paper channel equals the capacity of the Gaussian channel without the state (also called interference). Here, note that the channel state in [10,11,12] is assumed to be independent of the transmitted message. In [13], the channel with noncausal or causal state available at the transmitter is revisited by considering the case that the transmitter can take actions on the channel state, i.e., the state is no longer independent of the transmitted message. This model is known as the action-dependent channel with states, and the capacity of this model is determined for both the noncausal and causal cases. Moreover, for the Gaussian case of the action-dependent channel with states (also called action-dependent dirty paper channel), it is shown that the actions on the state enhance the capacity of the dirty paper channel. Recently, a natural extension of the channel with noncausal state at the transmitter to the secrecy communication setting receives a lot of attention.Specifically, the authors of [14,15,16] studied the discrete memoryless wiretap channel with noncausal state at the transmitter, and proposed lower and upper bounds on its secrecy capacity. Mitrpant et al. [17] studied the Gaussian case in [14] (also called the dirty paper wiretap channel), and showed that the state (interference) non-causally known by the transmitter helps to enhance the secrecy capacity of the Gaussian wiretap channel [18]. Dai et al. [19] extended the state-dependent wiretap channel [14] to a broadcast situation, and proposed inner and outer bounds on the secrecy capacity region of this model. Dai et al. [20] studied the physically degraded action-dependent wiretap channel with noncausal state, and proposed lower and upper bounds on its secrecy capacity. Here, note that the action encoder in [20] is assumed to be deterministic, which implies that the output of the action encoder is a deterministic function of the transmitted message, and this leads to additional information leakage to the eavesdropper. Based on the work of [20,21] studied the feedback effect on the model proposed in [20]. A secret key based feedback scheme is provided in [21], and it is shown to be optimal for the physically degraded case.
In this paper, we study the action-dependent wiretap channel with noncausal state and noiseless feedback (the model of this paper can be viewed as the model of [21] without physically degraded assumption and with stochastic action encoder) (see Figure 1), and try to answer the following two fundamental questions:
(1)
How should the feedback scheme in [9] be extended to the action-dependent wiretap channel with noncausal state?
(2)
For the action-dependent wiretap channel with noncausal state, does the hybrid feedback scheme in [9] still gain advantages over the traditional one used in [1,2,3,4,5,6,7,8]?
The main contribution of this paper includes:
(1)
We propose a new lower bound on the secrecy capacity of the action-dependent wiretap channel with noncausal state and noiseless feedback, which is constructed according to a hybrid feedback scheme similar to that in [9].
(2)
From a Gaussian example, which is also called the action-dependent dirty paper wiretap channel with noiseless feedback, we show that our new lower bound on the secrecy capacity is larger than the secret key based lower bound. Moreover, we find that our new lower bound achieves the secrecy capacity for some special cases.
The remainder of this paper is organized as follows. Section 2 is about the problem formulation and the main result of this paper. The achievability proof of our new lower bound on the secrecy capacity of the action-dependent wiretap channel with noncausal state and noiseless feedback is provided in Section 3. A Gaussian example and numerical results are provided in Section 4. Final conclusions are presented in Section 5.

2. Problem Formulation and New Result

Notations: For the rest of this manuscript, the random variables (RVs), values and alphabets are written in uppercase letters, lowercase letters and calligraphic letters, respectively. The random vectors and their values are denoted by a similar convention. For example, Y represents a RV, and y represents a value in the alphabet Y . Similarly, Y N represents a random N-vector ( Y 1 , . . . , Y N ) , and y N = ( y 1 , . . . , y N ) represents a vector value in Y N (the Nth Cartesian power of Y ). In addition, for an event X = x , its probability is denoted by P ( x ) . In the remainder of this manuscript, the base of the log function is 2.
Model description: In Figure 1, the channel is discrete memoryless, i.e., the overall channel transition probability is given by
P ( y N , z N | x N , s N ) = i = 1 N P ( z i , y i | x i , s i ) ,
where s i S , x i X , y i Y and z i Z . The message W is uniformly distributed in its alphabet W = { 1 , 2 , . . . , | W | } , and a stochastic action encoder encodes W into an action sequence A N . The channel state sequence S N is generated through a discrete memoryless channel (DMC) A N S N with transition probability P ( s | a ) . Since S N is non-causally known by the channel encoder and the legitimate receiver’s channel output is sent back to the transmitter, the ith ( i { 1 , 2 , . . . , N } ) channel input X i = f i ( W , S N , Y i - 1 ) , where f i is a stochastic encoding function. The legitimate receiver produces an estimation W ^ = ψ ( Y N ) ( ψ is the legitimate receiver’s decoding function), and the average decoding error probability equals
P e = 1 | W | i W P r { ψ ( y N ) i | i sent } .
The eavesdropper’s equivocation rate of the message W is formulated as
Δ = 1 N H ( W | Z N ) .
Given a positive number R, if for arbitrarily small ϵ and sufficiently large N, there exist a pair of channel encoder and decoder described above such that
log | W | N R - ϵ , Δ R - ϵ , P e ϵ ,
we say R is achievable with weak perfect secrecy. The secrecy capacity C s a f consists of all achievable weak secrecy rates, and bounds on C s a f are given in the following theorems and corollary.
Theorem 1.
C s a f R s a f * , where
R s a f * = max min { I ( U ; Y ) - I ( U ; S | A ) , [ I ( U ; V , Y ) - I ( U ; Z ) ] + + H ( Y | U , Z ) } ,
[ x ] + = x for x 0 , else [ x ] + = 0 , and the joint distribution is denoted by
P ( u , v , a , s , x , y , z ) = P ( v | u , y ) P ( y , z | x , s ) P ( x | u , s ) P ( u | a , s ) P ( a , s ) .
Proof. 
The lower bound R s a f * is achieved by combining the binning scheme in [13] with the hybrid coding scheme in [9], and the details about the proof are in Section 3. ☐
The following lower bound R s a f * * in Corollary 1 can be directly obtained from Theorem 1 by letting V be constant, and this lower bound can be viewed as a secret key based lower bound (application of the secret key based feedback strategy [1] to the model of Figure 1) on C s a f .
Corollary 1.
C s a f R s a f * * , where
R s a f * * = max min { I ( U ; Y ) - I ( U ; S | A ) , [ I ( U ; Y ) - I ( U ; Z ) ] + + H ( Y | U , Z ) } ,
and the joint distribution is denoted by
P ( u , a , s , x , y , z ) = P ( y , z | x , s ) P ( x | u , s ) P ( u | a , s ) P ( a , s ) .
Remark 1.
Note that [21] also proposed a secret key based lower bound on the secrecy capacity of the physically degraded action-dependent wiretap channel with noncausal state and noiseless feedback. However, we should point out that the model studied in [21] assumes the action encoder is a deterministic encoder, i.e., if the eavesdropper knows A N , he also knows the message W. Hence, our lower bound R s a f * * generalizes that in [21] as the deterministic action encoder is a special case of the stochastic one studied in this paper and there is no physically degraded assumption in this paper.
Besides the above lower bounds on C s a f , the following theorem shows a simple upper bound on C s a f .
Theorem 2.
C s a f C s a f - o u t , where
C s a f - o u t = max ( I ( U ; Y ) - I ( U ; S | A ) ) ,
and the joint distribution is denoted by Equation (8).
Proof. 
Since C s a f cannot exceed the capacity of the model in Figure 1 without eavesdropper, we know that C s a f is upper bounded by the capacity of the action-dependent channel with feedback. In [13], it has been shown that feedback does not increase the capacity of the action-dependent channel ( max ( I ( U ; Y ) - I ( U ; S | A ) ) ), hence Theorem 2 is proved. The proof of Theorem 2 is completed. ☐
In Section 4, the above proposed hybrid lower bound R s a f * ise compared with the secret key based lower bound R s a f * * via a Gaussian example, and we show which feedback strategy performs better.

3. Proof of Theorem 1

In this section, the hybrid feedback strategy for the wiretap channel [9] and the binning scheme for the action-dependent channel with noncausal state at the transmitter [13] are combined to show the achievability of Theorem 1. The rest of this section is organized as follows. The code-book construction and the transmission scheme are described in Section 3.1, and the equivocation analysis of the proposed scheme is shown in Section 3.2.

3.1. Code-Book Construction and Transmission Scheme

Definitions and notations:
  • Similar to the coding scheme in [9], suppose that the overall transmission consists of B blocks, and the codeword length in each block is N.
  • The overall message W is composed of B components ( W = ( W 1 , . . . , W B ) ), and each component W b ( b { 1 , 2 , . . . , B } ) is the message transmitted in block b. The value of W b belongs to the set { 1 , . . . , 2 N R } . Next, split W b into two parts W b = ( W b , 1 , W b , 2 ) , and the values of W b , 1 and W b , 2 , respectively, belong to the sets { 1 , . . . , 2 N R 1 } and { 1 , . . . , 2 N R 2 } . Note that R 1 + R 2 = R .
  • Analogously, the randomly produced dummy messages W and W , which are used to confuse the wiretapper, also consist of B components ( W = ( W 1 , . . . , W B ) and W = ( W 1 , . . . , W B ) ), and the components W b and W b ( b { 1 , 2 , . . . , B } ) are transmitted in block b. Here, note that W b and W b are uniformly drawn from the sets { 1 , . . . , 2 N R } and { 1 , . . . , 2 N R } , respectively.
  • The auxiliary message W * , which is used to cooperate with the channel state, consists of B components ( W * = ( W 1 * , . . . , W B * ) ), and the value of W b * ( b { 1 , 2 , . . . , B } ) belongs to the set { 1 , . . . , 2 N R * } .
  • The help information W * * and W * * * , which is used to ameliorate the legitimate receiver’s decoding performance, consists of B components ( W * * = ( W 1 * * , . . . , W B * * ) and W * * * = ( W 1 * * * , . . . , W B * * * ) ), and the value of W b * * and W b * * * ( b { 1 , 2 , . . . , B } ), respectively, belongs to the sets { 1 , . . . , 2 N R * * } and { 1 , . . . , 2 N R * * * } .
  • In block b ( 1 b B ), the random vectors A N , X N , Y N , Z N , S N , U N and V N are denoted by A ¯ b , X ¯ b , Y ¯ b , Z ¯ b , S ¯ b , U ¯ b and V ¯ b , respectively. In addition, let X B = ( X ¯ 1 , . . . , X ¯ B ) be a collection of the random vectors X N for all blocks. Analogously, we have A B = ( A ¯ 1 , . . . , A ¯ B ) , Y B = ( Y ¯ 1 , . . . , Y ¯ B ) , Z B = ( Z ¯ 1 , . . . , Z ¯ B ) , S B = ( S ¯ 1 , . . . , S ¯ B ) , U B = ( U ¯ 1 , . . . , U ¯ B ) and V B = ( V ¯ 1 , . . . , V ¯ B ) . The vector value is written in lower case letter.
Code-book generation:
  • In block b ( 1 b B ), randomly produce 2 N ( R 1 + R 2 + R ) i.i.d. codewords a ¯ b with respect to (w.r.t.) P ( a ) , and label them as a ¯ b ( w b , 1 , w b , 2 , w b ) , where w b , 1 { 1 , 2 , . . . , 2 N R 1 } , w b , 2 { 1 , 2 , . . . , 2 N R 2 } and w b { 1 , 2 , . . . , 2 N R } .
  • In block b ( 1 b B ), randomly produce 2 N ( R 1 + R 2 + R + R * + R * * ) i.i.d. codewords u ¯ b w.r.t. P ( u | a , s ) , and label them as u ¯ b ( w b , 1 , w b , 2 , w b , w b * , w b - 1 * * ) , where w b , 1 { 1 , 2 , . . . , 2 N R 1 } , w b , 2 { 1 , 2 , . . . , 2 N R 2 } , w b { 1 , 2 , . . . , 2 N R } , w b * { 1 , 2 , . . . , 2 N R * } and w b - 1 * * { 1 , 2 , . . . , 2 N R * * } .
  • For each possible value of u ¯ b ( w b , 1 , w b , 2 , w b , w b * , w b - 1 * * ) and y ¯ b , randomly produce 2 N ( R * * + R * * * ) i.i.d. codewords v ¯ b on the basis of P ( v | u , y ) . Then, label these v ¯ b as v ¯ b ( w b * * , w b * * * ) , where w b * * { 1 , 2 , . . . , 2 N R * * } and w b * * * { 1 , 2 , . . . , 2 N R * * * } .
  • For given u ¯ b and s ¯ b , the transmitted sequence x ¯ b is i.i.d. produced on the basis of the probability P ( x | u , s ) .
Encoding scheme:
  • For block 1, the transmitter chooses a ¯ 1 ( w 1 , 1 , w 1 , 2 = 1 , w 1 ) . Next, define w 0 * * = 1 , for given a ¯ 1 ( w 1 , 1 , w 1 , 2 = 1 , w 1 ) and the state sequence s ¯ 1 , the transmitter selects an index w 1 * such that ( u ¯ 1 ( w 1 , 1 , w 1 , 2 = 1 , w 1 , w 1 * , w 0 * * = 1 ) , a ¯ 1 ( w 1 , 1 , w 1 , 2 = 1 , w 1 ) , s ¯ 1 ) are jointly typical. If no such w 1 * exists, declare an encoding error. If multiple w 1 * exist, randomly pick out one. Based on the Covering Lemma [22], the encoding error tends to zero if
    R * > I ( U ; S | A ) .
  • For block b ( i { 2 , 3 , . . . , B - 1 } ), before transmission, produce a mapping g b : y ¯ b - 1 { 1 , 2 , . . . , 2 N R 2 } (this mapping is generated exactly the same as that in [1]). Based on this mapping, generate a random variable (RV) K b = g b ( Y ¯ b - 1 ) taking values in { 1 , 2 , . . . , 2 N R 2 } , and P r { K b = j } = 2 - N R 2 for j { 1 , 2 , . . . , 2 N R 2 } . The RV K b is used as a secret key and it is not known to the eavesdropper, and K b is independent of the real transmitted messages W b , 1 and W b , 2 for block b. Notice that k b = g b ( y ¯ b - 1 ) { 1 , 2 , . . . , 2 N R 2 } is a realization of K b . The mapping g b is revealed to all parties. First, since the transmitter knows its own u ¯ b - 1 ( w b - 1 , 1 , w b - 1 , 2 k b - 1 , w b - 1 , w b - 1 * , w b - 2 * * ) , a ¯ b - 1 ( w b - 1 , 1 , w b - 1 , 2 , w b - 1 ) , s ¯ b - 1 and y ¯ b - 1 , he tries to find a v ¯ b - 1 ( w b - 1 * * , w b - 1 * * * ) such that ( v ¯ b - 1 , u ¯ b - 1 , y ¯ b - 1 , s ¯ b - 1 , a ¯ b - 1 ) are jointly typical. For the case that more than one v ¯ b - 1 exist, randomly pick one; if no such v ¯ b - 1 exists, declare an encoding error. According to the Covering Lemma [22], the encoding error approaches to zero if
    R * * + R * * * I ( V ; U , Y , A , S ) = ( 1 ) I ( V ; U , Y ) ,
    where (1) is from the definition in Equation (6), which implies that V ( U , Y ) ( A , S ) . Next, the transmitter chooses a ¯ b ( w b , 1 , w b , 2 , w b ) . Finally, since the transmitter obtains v ¯ b - 1 ( w b - 1 * * , w b - 1 * * * ) , he extracts w b - 1 * * and tries to find a w b * such that ( u ¯ b ( w b , 1 , w b , 2 k b , w b , w b * , w b - 1 * * ) , a ¯ b ( w b , 1 , w b , 2 , w b ) , s ¯ b ) are jointly typical. If no such w b * exists, declare an encoding error. If multiple w b * exist, randomly pick out one. Based on the Covering Lemma [22], the encoding error tends to zero if Equation (10) holds. The codeword u ¯ b ( w b , 1 , w b , 2 k b , w b , w b * , w b - 1 * * ) is picked for transmission.
  • At block B, first, the transmitter chooses a ¯ B ( 1 , 1 , 1 ) . Next, after receiving the feedback y ¯ B - 1 , the transmitter tries to find a v ¯ B - 1 ( w B - 1 * * , w B - 1 * * * ) such that ( v ¯ B - 1 ( w B - 1 * * , w B - 1 * * * ) , u ¯ B - 1 , y ¯ B - 1 , s ¯ B - 1 , a ¯ B - 1 ) are jointly typical. After decoding such v ¯ B - 1 ( w B - 1 * * , w B - 1 * * * ) , the transmitter extracts w B - 1 * * and tries to find a w B * such that ( u ¯ B ( 1 , 1 , 1 , w B * , w B - 1 * * ) , a ¯ B ( 1 , 1 , 1 ) , s ¯ B ) are jointly typical. If no such w B * exists, declare an encoding error. If multiple w B * exist, randomly pick out one. The codeword u ¯ B ( 1 , 1 , 1 , w B * , w B - 1 * * ) is picked for transmission.
Decoding scheme:
The decoding procedure starts from block B. At block B, the legitimate receiver chooses a u ¯ B ( 1 , 1 , 1 , w B * , w B - 1 * * ) which is jointly typical with y ¯ B and a ¯ B ( 1 , 1 , 1 ) . For the case that more than one or no such u ¯ B exists, declare a decoding error. Based on the Packing Lemma [22] and a similar argument in [13], this kind of decoding error approaches to zero when
R * + R * * I ( U ; Y ) .
After decoding u ¯ B , the legitimate receiver extracts w B - 1 * * from it. Then, he tries to select only one v ¯ B - 1 ( w B - 1 * * , w B - 1 * * * ) such that given w B - 1 * * , v ¯ B - 1 is jointly typical with y ¯ B - 1 . For the case that more than one or no such v ¯ B - 1 exist, declare a decoding error. Based on the Packing Lemma [22], this kind of decoding error approaches to zero when
R * * * I ( V ; Y ) .
After obtaining such unique v ¯ B - 1 , the legitimate receiver tries to find only one pair of ( u ¯ B - 1 , a ¯ B - 1 ) such that ( y ¯ B - 1 , a ¯ B - 1 , v ¯ B - 1 , u ¯ B - 1 ) are jointly typical. Based on the Packing Lemma [22] and a similar argument in [13], this kind of decoding error approaches to zero when
R 1 + R 2 + R + R * + R * * + R I ( U ; V , Y ) .
After decoding u ¯ B - 1 , the legitimate receiver picks out w B - 1 , 1 , w B - 1 , 2 k B - 1 , w B - 2 * * from it. Note that the legitimate receiver has full knowledge of k B - 1 = g B - 1 ( y ¯ B - 2 ) , and hence he obtains the message w B - 1 = ( w B - 1 , 1 , w B - 1 , 2 ) . Analogously, the legitimate receiver decodes the messages w B - 2 , w B - 3 , . . . , w 1 , and the decoding procedure is completed. For convenience, the encoding and decoding schemes are explained by the following Figure 2 and Figure 3, respectively.

3.2. Equivocation Analysis

The overall equivocation Δ , which is denoted by Δ = 1 B N H ( W | Z B ) , is given by
Δ = ( a ) 1 B N ( H ( W ˜ 1 | Z B ) + H ( W ˜ 2 | Z B , W ˜ 1 ) ) ,
where (a) is due to the definitions W ˜ 1 = ( W 1 , 1 , . . . , W B , 1 ) and W ˜ 2 = ( W 1 , 2 , . . . , W B , 2 ) .
The term H ( W ˜ 1 | Z B ) in Equation (15) can be bounded by
H ( W ˜ 1 | Z B ) = H ( W ˜ 1 , Z B ) - H ( Z B ) = H ( W ˜ 1 , Z B , U B ) - H ( U B | W ˜ 1 , Z B ) - H ( Z B ) = ( b ) H ( U B ) - H ( U B | W ˜ 1 , Z B ) - I ( U B ; Z B ) = ( c ) ( B - 1 ) N R 1 + ( B - 2 ) N R 2 + ( B - 1 ) N R + B N R * + ( B - 1 ) N R * * - B N I ( U ; Z ) - H ( U B | W ˜ 1 , Z B ) ( d ) ( B - 1 ) N R 1 + ( B - 2 ) N R 2 + ( B - 1 ) N R + B N R * + ( B - 1 ) N R * * - B N I ( U ; Z ) - B N ϵ 3 ,
where (b) is implied by H ( W ˜ 1 | U B ) = 0 , (c) is due to the construction of U B and the channel is memoryless, and (d) is due to that given w ˜ 1 and z B , the eavesdropper attempts to find a unique u B that is jointly typical with his own received signals z B , and according to the Packing Lemma [22], we can conclude that the eavesdropper’s decoding error tends to zero if
R 2 + R + R * + R * * I ( U ; Z ) ,
then applying Fano’s inequality, 1 B N H ( U B | W ˜ 1 , Z B ) ϵ 3 is obtained, where ϵ 3 0 while B , N .
Moreover, the term H ( W ˜ 2 | Z B , W ˜ 1 ) in Equation (15) can be bounded by
H ( W ˜ 2 | Z B , W ˜ 1 ) i = 2 B - 1 H ( W i , 2 | Z B , W ˜ 1 , W 1 , 2 = 1 , . . . , W i - 1 , 2 , W i , 2 K i ) = ( e ) i = 2 B - 1 H ( W i , 2 | Z ¯ i - 1 , W i , 2 K i ) i = 2 B - 1 H ( W i , 2 | Z ¯ i - 1 , U ¯ i - 1 , W i , 2 K i ) = i = 2 B - 1 H ( K i | Z ¯ i - 1 , U ¯ i - 1 , W i , 2 K i ) = ( f ) i = 2 B - 1 H ( K i | Z ¯ i - 1 , U ¯ i - 1 ) ( g ) ( B - 2 ) ( log 1 - ϵ 1 1 + δ + N ( 1 - ϵ 2 ) H ( Y | U , Z ) ) ,
where (e) is due to the Markov chain W i , 2 ( Z ¯ i - 1 , W i , 2 K i ) ( W ˜ 1 , W 1 , 2 , . . . , W i - 1 , 2 , Z ¯ 1 , . . . , Z ¯ i - 2 , Z ¯ i , . . . , Z ¯ B ) , (f) follows by K i ( Z ¯ i - 1 , U ¯ i - 1 ) W i , 2 K i , and (g) is from the balanced coloring Lemma [9] (p. 264), i.e., given z ¯ i - 1 and u ¯ i - 1 , there are at least γ 1 + δ colors, which implies that
H ( K i | Z ¯ i - 1 , U ¯ i - 1 ) log 1 - ϵ 1 1 + δ + N ( 1 - ϵ 2 ) H ( Y | U , Z ) ,
where ϵ 1 , ϵ 2 and δ approach to 0 as N goes to infinity.
Substituting Equations (16) and (18) into Equation (15), we have
Δ R * + B - 1 B ( R 1 + R + R * * ) + B - 2 B R 2 - I ( U ; Z ) - ϵ 3 + B - 2 B N log 1 - ϵ 1 1 + δ + B - 2 B ( 1 - ϵ 2 ) H ( Y | U , Z ) .
The bound in Equation (20) indicates that if
R + R * + R * * I ( U ; Z ) - H ( Y | U , Z ) ,
Δ R 1 + R 2 - ϵ can be proved by choosing sufficiently large B and N.
Now combining Equation (11) with Equation (13), we have
R * * I ( U , Y ; V ) - I ( Y ; V ) = I ( V ; U | Y ) .
Next, from Equations (22), (10) and (14), we can conclude that
R 1 + R 2 + R + R I ( Y , V ; U ) - I ( V ; U | Y ) - I ( U ; S | A ) = I ( U ; Y ) - I ( U ; S | A ) .
Then, implied by Equations (21) and (14), we have
R 1 + R 2 + R I ( Y , V ; U ) - I ( U ; Z ) + H ( Y | U , Z ) .
Finally, applying Fourier–Motzkin elimination to remove R 1 , R 2 ( R = R 1 + R 2 ), R , R , R * and R * * from Equations (22), (23), (24), (12), (14), (17) and (21), Theorem 1 is proved.

4. The Action-Dependent Dirty Paper Wiretap Channel with Noiseless Feedback

The Gaussian case of the action-dependent wiretap channel with noncausal state at the transmitter and feedback, which we also call the action-dependent dirty paper wiretap channel with noiseless feedback, is depicted in Figure 4. At time i ( i { 1 , 2 , . . . , N } ), the inputs and outputs of this Gaussian model satisfy
S i = A i + W i , Y i = X i + S i + η 1 , i , Z i = X i + t S i + η 2 , i ,
where X i is the channel input subject to an average power constraint P, A i is the output of the action encoder subject to an average power constraint P A , t is a constant, and W i , η 1 , i , η 2 , i are independent Gaussian noises and are i.i.d. across the time index i. Here, note that W i N ( 0 , σ w 2 ) , η 1 , i N ( 0 , σ 1 2 ) and η 2 , i N ( 0 , σ 2 2 ) . The secrecy capacity of the action-dependent dirty paper wiretap channel with feedback is denoted by C s a g f , and the lower and upper bounds on C s a g f will be given in the remainder of this section.
Before we show the bounds on C s a g f , define
A N ( 0 , P A ) , X = α A + γ W + G , U = δ X + A + β W ,
where α 2 P A + γ 2 σ w 2 P , G N ( 0 , P - α 2 P A - γ 2 σ w 2 ) and G, A, W, η 1 , η 2 are independent of each other. Note that the definitions in Equation (26) are exactly the same as those in the action-dependent dirty paper channel [13]. Further, define
D = P - α 2 P A - γ 2 σ w 2 ,
E ( U 2 ) = ( 1 + δ α ) 2 P A + ( δ γ + β ) 2 σ w 2 + δ 2 D ,
E ( Y 2 ) = ( α + 1 ) 2 P A + ( γ + 1 ) 2 σ w 2 + D + σ 1 2 ,
E ( Z 2 ) = ( α + t ) 2 P A + ( γ + t ) 2 σ w 2 + D + σ 2 2 ,
E ( U Y ) = ( 1 + δ α ) ( 1 + α ) P A + ( δ γ + β ) ( 1 + γ ) σ w 2 + δ D ,
E ( U Z ) = ( 1 + δ α ) ( t + α ) P A + ( δ γ + β ) ( t + γ ) σ w 2 + δ D ,
E ( Y Z ) = ( 1 + α ) ( t + α ) P A + ( γ + 1 ) ( γ + t ) σ w 2 + D ,
L = d e t E ( U 2 ) E ( U Y ) E ( U Z ) E ( U Y ) E ( Y 2 ) E ( Y Z ) E ( U Z ) E ( Y Z ) E ( Z 2 ) .
First, substituting Equations (26) and (25) into Equation (5), our new lower bound R s a g f * on C s a g f is given by the following Theorem 3.
Theorem 3.
C s a g f R s a g f * , where
R s a g f * = max α , γ , δ , β min { 1 2 log ( E ( Y 2 ) E ( U 2 ) E ( Y 2 ) E ( U 2 ) - ( E ( U Y ) ) 2 ) - 1 2 log ( ( γ δ + β ) 2 σ w 2 + δ 2 D δ 2 D ) , [ 1 2 log ( 2 π e E ( U 2 ) ) - 1 2 log ( E ( Z 2 ) E ( U 2 ) E ( Z 2 ) E ( U 2 ) - ( E ( U Z ) ) 2 ) ] + + 1 2 log ( 2 π e L E ( Z 2 ) E ( U 2 ) - ( E ( U Z ) ) 2 ) } ,
and [ x ] + = x for x 0 , else [ x ] + = 0 .
Second, substituting Equations (26) and (25) into Equation (7), the secret key based lower bound R s a g f * * on C s a g f is given by the following Theorem 4.
Theorem 4.
C s a g f R s a g f * * , where
R s a g f * * = max α , γ , δ , β min { 1 2 log ( E ( Y 2 ) E ( U 2 ) E ( Y 2 ) E ( U 2 ) - ( E ( U Y ) ) 2 ) - 1 2 log ( ( γ δ + β ) 2 σ w 2 + δ 2 D δ 2 D ) , [ 1 2 log ( E ( Y 2 ) E ( U 2 ) E ( Y 2 ) E ( U 2 ) - ( E ( U Y ) ) 2 ) - 1 2 log ( E ( Z 2 ) E ( U 2 ) E ( Z 2 ) E ( U 2 ) - ( E ( U Z ) ) 2 ) ] + + 1 2 log ( 2 π e L E ( Z 2 ) E ( U 2 ) - ( E ( U Z ) ) 2 ) } ,
and [ x ] + = x for x 0 , else [ x ] + = 0 .
Third, substituting Equations (26) and (25) into Equation (9), the upper bound C s a g f - o u t on C s a g f is given by Theorem 5.
Theorem 5.
C s a g f C s a g f - o u t , where
C s a g f - o u t = 1 2 log ( max ( α , γ ) : α 2 P A + γ 2 σ w 2 P σ 1 2 + D σ 1 2 · D + σ w 2 ( γ + 1 ) 2 + σ 1 2 + P A ( α + 1 ) 2 D + σ w 2 ( γ + 1 ) 2 + σ 1 2 ) .
Proof. 
Here note that Equation (9) is also the capacity of the action-dependent channel with noncausal state at the transmitter, and the capacity formula of its Gaussian case is be given in [13] by substituting Equations (26) and (25) into Equation (9) and maximizing the parameters δ and β . Now, directly using the Gaussian capacity formula in [13], we have Equation (37). The proof is completed. ☐
Finally, to show the feedback gain, we also provide a lower bound C s a g i n on the secrecy capacity C s a g of the action-dependent dirty paper wiretap channel (see Theorem 6).
Theorem 6.
C s a g C s a g i n , where
C s a g i n = max α , γ , δ , β min { 1 2 log ( E ( Y 2 ) E ( U 2 ) E ( Y 2 ) E ( U 2 ) - ( E ( U Y ) ) 2 ) - 1 2 log ( ( γ δ + β ) 2 σ w 2 + δ 2 D δ 2 D ) , 1 2 log ( E ( Y 2 ) E ( U 2 ) E ( Y 2 ) E ( U 2 ) - ( E ( U Y ) ) 2 ) - 1 2 log ( E ( Z 2 ) E ( U 2 ) E ( Z 2 ) E ( U 2 ) - ( E ( U Z ) ) 2 ) } ,
Proof. 
In [20], a lower bound C s a i n on the secrecy capacity C s a of the discrete memoryless action-dependent wiretap channel with noncausal state at the transmitter is provided, and it is given by
C s a i n = max min { I ( U ; Y ) - I ( U ; S | A ) , I ( U ; Y ) - I ( U ; Z ) , H ( A | Z ) } .
Here, note that the term H ( A | Z ) in Equation (39) holds due to the assumption that the action encoder is a deterministic function of the transmitted message. Specifically, once the eavesdropper obtains the action sequence A N , he knows the transmitted message, hence the achievable secrecy rate cannot exceed the eavesdropper’s uncertainty about A N , i.e., H ( A | Z ) .
In this paper, we use a stochastic action encoder instead of the deterministic one in [20], which indicates that, even if the eavesdropper obtains A N , he does not know the transmitted message due to the randomness assumption of the action encoder. Hence. the term H ( A | Z ) no longer holds in this paper, i.e., for the action-dependent wiretap channel with noncausal state at the transmitter and stochastic action encoder, a lower bound C s a i n * is given by
C s a i n * = max min { I ( U ; Y ) - I ( U ; S | A ) , I ( U ; Y ) - I ( U ; Z ) } .
Finally, substituting Equations (26) and (25) into Equations (40), Equation (38) is obtained. The proof is completed. ☐
Figure 5 depicts the bounds on C s a g f and the lower bound C s a g i n on the secrecy capacity of the action-dependent dirty paper wiretap channel for σ w 2 = P A = 1 , σ 1 2 = 1 , σ 2 2 = 0.1 , t = 0.9 and several values of P. For this case, we see that there is no positive achievable secrecy rate C s a g i n of the action-dependent dirty paper wiretap channel, and feedback enhances C s a g i n . Moreover, we see that the hybrid feedback scheme performs better than the secret key based feedback scheme, and there exists a gap between the lower and upper bounds on C s a g f when P is sufficiently large.
Figure 6 depicts the bounds on C s a g f and the lower bound C s a g i n on the secrecy capacity of the action-dependent dirty paper wiretap channel for σ w 2 = P A = 1 , σ 1 2 = 0.1 , σ 2 2 = 0.1 , t = 0.6 and P taking values in [ 0 , 0.5 ] . For this case, we see that feedback enhances C s a g i n , and the hybrid feedback scheme performs better than the secret key based feedback scheme. Moreover, we see that, when P is small, the hybrid feedback scheme is optimal, i.e., its corresponding lower bound meets the upper bound, which implies that the secrecy capacity C s a g f is determined for this case. Figure 7 is an extension of Figure 6 with P taking values in [ 0 , 50 ] . We see that, when P is sufficiently large, there exists a gap between the lower and upper bounds on C s a g f , and eliminating this gap still has a long way to go.

5. Conclusions

In this paper, we propose two achievable secrecy rates for the action-dependent wiretap channel with noncausal state at the transmitter and feedback, where one rate is achieved by using the already existing secret key based feedback strategy, and the other is achieved by using a hybrid feedback strategy. From a Gaussian example (also called the action-dependent dirty paper wiretap channel with feedback), we show that both feedback strategies proposed in this paper enhance the achievable secrecy rate of the action-dependent dirty paper wiretap channel, and the hybrid feedback strategy performs better than the secret key based feedback strategy. Moreover, we show that the hybrid feedback strategy is optimal for some special cases.

Author Contributions

H.Z. did the theoretical work, performed the experiments, analyzed the data and drafted the work; B.D. designed the work, performed the theoretical work, analyzed the data, interpreted the data for the work and revised the work; and L.Y. performed the theoretical work, interpreted the data for the work and revised the work. All authors approved the version to be published and agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grants 61671391 and U1734209), the China Scholarship Council (file No. 201807005013), and the 111 Project No. 111-2-14.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MDPIMultidisciplinary Digital Publishing Institute
DOAJDirectory of open access journals
TLAThree letter acronym
LDlinear dichroism

References

  1. Ahlswede, R.; Cai, N. Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder. In General Theory of Information Transfer and Combinatorics; Springer: Berlin/Heidelberg, Germany, 2006; pp. 258–275. [Google Scholar]
  2. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  3. Ardestanizadeh, E.; Franceschetti, M.; Javidi, T.; Kim, Y. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory 2009, 55, 5353–5361. [Google Scholar] [CrossRef]
  4. Schaefer, R.F.; Khisti, A.; Poor, H.V. Secure broadcasting using independent secret keys. IEEE Trans. Commun. 2018, 66, 644–661. [Google Scholar] [CrossRef]
  5. Ekrem, E.; Ulukus, S. Secrecy capacity of a class of broadcast channels with an eavesdropper. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 1–29. [Google Scholar] [CrossRef]
  6. Cohen, A.; Cohen, A. Wiretap channel with causal state information and secure rate-limited feedback. IEEE Trans. Commun. 2016, 64, 1192–1203. [Google Scholar] [CrossRef]
  7. Dai, B.; Ma, Z.; Luo, Y. Finite state Markov wiretap channel with delayed feedback. IEEE Trans. Inf. Forensics Secur. 2017, 12, 746–760. [Google Scholar] [CrossRef]
  8. Dai, B.; Ma, Z.; Xiao, M.; Tang, X.; Fan, P. Secure communication over finite state multiple-access wiretap channel with delayed feedback. IEEE J. Sel. Areas Commun. 2018, 36, 723–736. [Google Scholar] [CrossRef]
  9. Dai, B.; Luo, Y. An improved feedback coding scheme for the wiretap channel. IEEE Trans. Inf. Forensics Secur. 2019, 14, 262–271. [Google Scholar] [CrossRef]
  10. Kuznetsov, N.V.; Tsybakov, B.S. Coding in memories with defective cells. Probl. Control Inf. Theory 1974, 10, 52–60. [Google Scholar]
  11. Gel’fand, S.I.; Pinsker, M.S. Coding for channel with random parameters. Probl. Control Inf. Theory 1980, 9, 19–31. [Google Scholar]
  12. Costa, M.H.M. Writing on dirty paper. IEEE Trans. Inf. Theory 1983, 29, 439–441. [Google Scholar] [CrossRef]
  13. Weissman, T. Capacity of channels with action-dependent states. IEEE Trans. Inf. Theory 2010, 56, 5396–5411. [Google Scholar] [CrossRef]
  14. Chen, Y.; Han Vinck, A.J. Wiretap channel with side information. IEEE Trans. Inf. Theory 2008, 54, 395–402. [Google Scholar] [CrossRef]
  15. Dai, B.; Luo, Y. Some new results on wiretap channel with side information. Entropy 2012, 14, 1671–1702. [Google Scholar] [CrossRef]
  16. El-Halabi, M.; Liu, T.; Georghiades, C.N.; Shamai, S. Secret writing on dirty paper: A deterministic view. IEEE Trans. Inf. Theory 2012, 58, 3419–3429. [Google Scholar] [CrossRef]
  17. Mitrpant, C.; Han Vinck, A.J.; Luo, Y. An achievable region for the gaussian wiretap channel with side information. IEEE Trans. Inf. Theory 2006, 52, 2181–2190. [Google Scholar] [CrossRef]
  18. Leung-Yan-Cheong, S.K.; Hellman, M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  19. Dai, B.; Ma, Z.; Fang, X. Feedback enhances the security of state-dependent degraded broadcast channels with confidential messages. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1529–1542. [Google Scholar] [CrossRef]
  20. Dai, B.; Han Vinck, A.J.; Luo, Y.; Tang, X. Wiretap channel with action-dependent channel state information. Entropy 2013, 15, 445–473. [Google Scholar] [CrossRef]
  21. Dai, B.; Han Vinck, A.J.; Luo, Y. Wiretap channel in the presence of action-dependent states and noiseless feedback. J. Appl. Math. 2013, 2013, 1–17. [Google Scholar] [CrossRef]
  22. El Gamal, A.; Kim, Y.H. Information measures and typicality. In Network Information Theory; Cambridge University Press: Cambridge, UK, 2011; pp. 17–37. ISBN 978-1-107-00873-1. [Google Scholar]
Figure 1. The action-dependent wiretap channel with noncausal state and noiseless feedback.
Figure 1. The action-dependent wiretap channel with noncausal state and noiseless feedback.
Entropy 21 00278 g001
Figure 2. The encoding procedure for all blocks.
Figure 2. The encoding procedure for all blocks.
Entropy 21 00278 g002
Figure 3. The decoding procedure for all blocks.
Figure 3. The decoding procedure for all blocks.
Entropy 21 00278 g003
Figure 4. The action-dependent dirty paper wiretap channel with noiseless feedback.
Figure 4. The action-dependent dirty paper wiretap channel with noiseless feedback.
Entropy 21 00278 g004
Figure 5. Comparison of the bounds on C s a g f for P A = 1 , σ w 2 = 1 , σ 1 2 = 1 , σ 2 2 = 0.1 , t = 0.9 and P taking values in [ 0 , 5000 ] .
Figure 5. Comparison of the bounds on C s a g f for P A = 1 , σ w 2 = 1 , σ 1 2 = 1 , σ 2 2 = 0.1 , t = 0.9 and P taking values in [ 0 , 5000 ] .
Entropy 21 00278 g005
Figure 6. Comparison of the bounds on C s a g f for P A = 1 , σ w 2 = 1 , σ 1 2 = 0.1 , σ 2 2 = 0.1 , t = 0.6 and P taking values in [ 0 , 0.5 ] .
Figure 6. Comparison of the bounds on C s a g f for P A = 1 , σ w 2 = 1 , σ 1 2 = 0.1 , σ 2 2 = 0.1 , t = 0.6 and P taking values in [ 0 , 0.5 ] .
Entropy 21 00278 g006
Figure 7. Comparison of the bounds on C s a g f for P A = 1 , σ w 2 = 1 , σ 1 2 = 0.1 , σ 2 2 = 0.1 , t = 0.6 and P taking values in [ 0 , 50 ] .
Figure 7. Comparison of the bounds on C s a g f for P A = 1 , σ w 2 = 1 , σ 1 2 = 0.1 , σ 2 2 = 0.1 , t = 0.6 and P taking values in [ 0 , 50 ] .
Entropy 21 00278 g007

Share and Cite

MDPI and ACS Style

Zhang, H.; Yu, L.; Dai, B. Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter. Entropy 2019, 21, 278. https://doi.org/10.3390/e21030278

AMA Style

Zhang H, Yu L, Dai B. Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter. Entropy. 2019; 21(3):278. https://doi.org/10.3390/e21030278

Chicago/Turabian Style

Zhang, Haonan, Linman Yu, and Bin Dai. 2019. "Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter" Entropy 21, no. 3: 278. https://doi.org/10.3390/e21030278

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop