Stealth Communication with Vanishing Power over Binary Symmetric Channels
Diego Lentner, Gerhard Kramer Technical University of Munich Institute for Communications Engineering ISIT 2020
Stealth Communication with Vanishing Power over Binary Symmetric - - PowerPoint PPT Presentation
Stealth Communication with Vanishing Power over Binary Symmetric Channels Diego Lentner, Gerhard Kramer Technical University of Munich Institute for Communications Engineering ISIT 2020 Covert Communication Covert Communication vs. Secrecy:
Diego Lentner, Gerhard Kramer Technical University of Munich Institute for Communications Engineering ISIT 2020
Alice Bob Warren I s A l i c e c
m u n i c a t i n g w i t h B
? ( y e s / n
Covert Communication vs. Secrecy:
message, i.e., we minimize the mutual information between Alice’s message and Eve’s channel output.
the presence of communication! Other names:
Diego Lentner, Gerhard Kramer (TUM) 2
PFA + PMD where PFA and PMD are the probabilities of false alarm and missed detection, respectively.
PFA + PMD = 1 − VT(P0, P1).
2 D(P0P1).
Diego Lentner, Gerhard Kramer (TUM) 3
Alice PY|X X n Bob Y n PZ|X Warren Z n
binary hypothesis test:
Z |X(·|0),
Z |X(·|0)) ≤ δ
for a small δ > 0.
Diego Lentner, Gerhard Kramer (TUM) 4
n) bits to Bob without being detected by Warren. This means that the rate is zero.
n)/n = 0 !
n log n) pre-shared key bits are necessary. If Alice knows the statistics of her channel to Warren, O(√ n) key bits suffice.
can be improved.
Diego Lentner, Gerhard Kramer (TUM) 5
Main idea: Alice confuses Warren by sending obfuscation symbols i.i.d. ∼ PXo,n
Zo) ≤ δ
for a small constant δ > 0. Then: Positive-rate stealth communication possible!
Diego Lentner, Gerhard Kramer (TUM) 6
We are interested in stealth communication
1 nE
X 2
i
n , 0 ≤ α < 1, a > 0. Assume
p = 1 − p, 0 ≤ α ≤ 1, and 0 < a < 1.
How much information can we transmit with VP over n channel uses?
n anα n
n
n p
n
n ¯
Diego Lentner, Gerhard Kramer (TUM) 7
M = enR.
P(E) ≤ e−nEG(R,PX) with Gallager exponent (Gallager ’68) EG(R, PX) = max
0≤ρ≤1 [E0(ρ, PX) − ρR]
and E0(ρ, PX) = − log
P(x)P(y|x)
1 1+ρ
M = enαRα.
P(E) ≤ e−nα ˆ
Eα
G(Rα,PX,n)
with VP Gallager exponent
Eα
G(Rα, PX,n) = max 0≤ρ≤1
Eα
0 (ρ, PX,n) − ρRα
Eα
0 (ρ, PX,n) = lim n→∞
n nαE0(ρ, PX,n)
Diego Lentner, Gerhard Kramer (TUM) 8
Eα
0 (ρ, PX,n)
n→∞ n nα
n
p
1 1+ρ + anα
n p
1 1+ρ
n
1 1+ρ + anα
n ¯
p
1 1+ρ
p
1 1+ρ − p 1 1+ρ
p
ρ 1+ρ − p ρ 1+ρ
E0(ρ, PX,n),
Example: a = 0.2, α = 0.5, p = 0.1. 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 Rα
Eα
G(Rα, PX,n)
Rα,max(PX,n)
Rα,max(PX,n) = ∂ ˆ Eα
0 (ρ, PX,n)
p p,
I(PX,n; PY |X),
Diego Lentner, Gerhard Kramer (TUM) 9
Alice PY|X X n Bob Y n PZ|X Warren Z n
1 n E
X 2
i
n , 0 ≤ β < 1, 0 < b .
Zo)
!
How large can Alice choose (α, a) for the given vanishing obfuscation power?
Diego Lentner, Gerhard Kramer (TUM) 10
Zo) = n D(PZ,nPZo,n)
!
2
q − q)2 q¯ q
n
n
For sufficiently large n, uncoded stealth communication with α, β < 1 is possible if
n with k =
q
q − q
Diego Lentner, Gerhard Kramer (TUM) 11
n
n = 0 (covert communication):
a ≤ k.
a ≤ k + b.
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
β α D(PZ,nPZo,n) = 0 possible ⇔
= 0
n D(PZ,nPZo,n) ≤ δ possible
⇔
≤ k√
n
Diego Lentner, Gerhard Kramer (TUM) 12
We can bound
nα
p p,
I(PX,n; PY |X),
nα
q q − a(1 − 2p) log ¯ p p
where
n for specified (β, b). Note:
n = 0, we recover the bounds from Bloch ’16 evaluated for BSCs.
Diego Lentner, Gerhard Kramer (TUM) 13
for noisy channel coding theorem
(a) Proof with VP resolvability exponents (following Hayashi ’06, Hou and Kramer ’13). (b) Uncoded stealth scenario, reuse result! (c) Bound with Pinsker’s and Jensen’s inequalities.
CPn
Zo)
CPn
Z)
ZPn Zo)
PZ n| ˜
C(zn| ˜
Z(zn)
Z(zn)
Pn
Zo(zn)
Diego Lentner, Gerhard Kramer (TUM) 14
Main results:
communication as extreme cases.
Outlook
Diego Lentner, Gerhard Kramer (TUM) 15
channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.
5, pp. 2334–2354, May 2016.
. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” in Proc. IEEE Int. Symp.
application to the wiretap channel,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562–1575, Apr. 2006.
Theory (CWIT), Toronto, ON, Canada, Jun. 2013, pp. 76–81.
Honolulu, HI, USA, Jun. 2014, pp. 601–605.
Privacy of Information Systems, H. Boche, A. Khisti, H. V. Poor, and R. F . Schaefer, Eds. Cambridge Univ. Press, 2017, pp. 3–20.
Diego Lentner, Gerhard Kramer (TUM) 16