Source-Channel Secrecy for Shannon Cipher System
Lei Yu,Houqiang Li,Weiping Li
DOI: https://doi.org/10.1109/tit.2017.2669188
2016-01-01
Abstract:Recently, a secrecy measure based on list-reconstruction has been proposed [1], in which a wiretapper is allowed to produce a list of 2 (m R L) reconstruction sequences and secrecy is measured by the minimum distortion over the entire list. In this paper, we show that this list secrecy problem is equivalent to one with secrecy measured by a new quantity lossy-equivocation, which is proven to be the minimum optimistic 1-achievable source coding rate of the source with the wirtapped signal as two-sided information, and also can be seen as an extension of conventional equivocation to lossy case. Upon this (or list) secrecy measure, we study source-channel secrecy problem in the discrete memoryless Shannon cipher system with noisy wiretap channel. Two inner bounds and an outer bound on the achievable region of secret key rate, list rate, wiretapper distortion, and distortion of legitimate user are given. The inner bounds are derived by using an uncoded scheme and a (operationly) separate scheme, respectively. Thanks to the equivalence between lossy-equivocation secrecy and list secrecy, the information spectrum method is leveraged to prove the outer bound. As special cases, the admissible region for the cases of degraded wiretap channel or lossless communication for legitimate user has been characterized completely. For both these two cases, separate scheme is proven to be optimal. Interestingly, however, separation indeed suffers performance loss for other certain cases. Besides, we also extend our results to characterize the achievable region for Gaussian communication case. As a side product optimistic lossy source coding has also been addressed.