Title | On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Li, C., He, J., Liu, S., Guo, D., Song, L. |
Conference Name | 2020 IEEE International Symposium on Information Theory (ISIT) |
Date Published | jun |
Keywords | 5G mobile communication, 5G wireless networks, Asymmetric, Big Data, Codecs, coding theory, Communication networks, compositionality, cryptography, data privacy, exact secure rate region, Gaussian processes, Internet of Things, key size, key size characterization, linear codes, Metrics, multilevel diversity coding, multilevel diversity coding systems, network coding, private key cryptography, pubcrawl, resilience, Resiliency, S-AMDCS, secrecy, secrecy key size, secure asymmetric MDCS, secure asymmetric multilevel diversity coding system, security, source-separate coding, superposition secure rate region, symmetric, telecommunication security, wiretap channel, wiretap channels, wiretapped messages |
Abstract | With the explosive development of big data, it is necessary to sort the data according to their importance or priorities. The sources with different importance levels can be modeled by the multilevel diversity coding systems (MDCS). Another trend in future communication networks, say 5G wireless networks and Internet of Things, is that users may obtain their data from all available sources, even from devices belonging to other users. Then, the privacy of data becomes a crucial issue. In a recent work by Li et al., the secure asymmetric MDCS (S-AMDCS) with wiretap channels was investigated, where the wiretapped messages do not leak any information about the sources (i.e. perfect secrecy). It was shown that superposition (source-separate coding) is not optimal for the general S-AMDCS and the exact full secure rate region was proved for a class of S-AMDCS. In addition, a bound on the key size of the secure rate region was provided as well. As a further step on the SAMDCS problem, this paper mainly focuses on the key size characterization. Specifically, the constraints on the key size of superposition secure rate region are proved and a counterexample is found to show that the bound on the key size of the exact secure rate region provided by Li et al. is not tight. In contrast, tight necessary and sufficient constraints on the secrecy key size of the counterexample, which is the four-encoder S-AMDCS, are proved. |
DOI | 10.1109/ISIT44484.2020.9174410 |
Citation Key | li_secrecy_2020 |