{"title":"Optimal Information Security Against Limited-View Adversaries: The Benefits of Causality and Feedback","authors":"Mayank Bakshi;Swanand Kadhe;Qiaosheng Zhang;Sidharth Jaggi;Alex Sprintson","doi":"10.1109/TCOMM.2025.3529664","DOIUrl":null,"url":null,"abstract":"The Singleton bound provides a fundamental limit on the maximum possible size of an error-correcting code of a given length and distance. However, recent work by Zhang et. al. [IEEE Trans. Comm., Dec. 2023] showed that in the context of the wiretap multipath network when the adversary has limited knowledge about the codewords and a vanishing probability of decoding error is permitted, a rate higher than the Singleton bound is achievable. Their results, however, are confined to an ideal setting where the adversary is allowed to behave non-causally. Motivated by real-world scenarios, this work considers communication over a wiretap multipath network in the presence of a causal adversary (i.e., the adversary which is only allowed to use the observations up to the current time slot to decide the current jamming strategy) and in the presence of passive feedback from the receiver to the transmitter. We characterize both the capacity and secrecy capacity of the wiretap multipath network, either with or without passive feedback. We observe that in comparison to the non-causal and non-feedback setting, the capacity and secrecy capacity can be strictly higher for a wide variety of parameters, demonstrating the benefits of causality and feedback.","PeriodicalId":13041,"journal":{"name":"IEEE Transactions on Communications","volume":"73 8","pages":"5908-5919"},"PeriodicalIF":8.3000,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Communications","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10844540/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
The Singleton bound provides a fundamental limit on the maximum possible size of an error-correcting code of a given length and distance. However, recent work by Zhang et. al. [IEEE Trans. Comm., Dec. 2023] showed that in the context of the wiretap multipath network when the adversary has limited knowledge about the codewords and a vanishing probability of decoding error is permitted, a rate higher than the Singleton bound is achievable. Their results, however, are confined to an ideal setting where the adversary is allowed to behave non-causally. Motivated by real-world scenarios, this work considers communication over a wiretap multipath network in the presence of a causal adversary (i.e., the adversary which is only allowed to use the observations up to the current time slot to decide the current jamming strategy) and in the presence of passive feedback from the receiver to the transmitter. We characterize both the capacity and secrecy capacity of the wiretap multipath network, either with or without passive feedback. We observe that in comparison to the non-causal and non-feedback setting, the capacity and secrecy capacity can be strictly higher for a wide variety of parameters, demonstrating the benefits of causality and feedback.
单例边界对给定长度和距离的纠错码的最大可能大小提供了基本限制。然而,Zhang等人最近的研究[IEEE Trans.]Comm., december 2023]表明,在窃听多路径网络的背景下,当对手对码字的了解有限并且允许解码错误的消失概率时,可以实现高于单例边界的速率。然而,他们的结果被限制在一个理想的环境中,在这个环境中,对手被允许采取非因果行为。受现实世界场景的启发,这项工作考虑了在存在因果对手(即,对手只允许使用到当前时隙的观测来决定当前干扰策略)和存在从接收器到发射器的被动反馈的情况下,通过窃听多径网络进行通信。我们描述了有或没有被动反馈的窃听多径网络的容量和保密能力。我们观察到,与非因果和非反馈设置相比,对于各种参数,容量和保密能力可以严格更高,这表明因果关系和反馈的好处。
期刊介绍:
The IEEE Transactions on Communications is dedicated to publishing high-quality manuscripts that showcase advancements in the state-of-the-art of telecommunications. Our scope encompasses all aspects of telecommunications, including telephone, telegraphy, facsimile, and television, facilitated by electromagnetic propagation methods such as radio, wire, aerial, underground, coaxial, and submarine cables, as well as waveguides, communication satellites, and lasers. We cover telecommunications in various settings, including marine, aeronautical, space, and fixed station services, addressing topics such as repeaters, radio relaying, signal storage, regeneration, error detection and correction, multiplexing, carrier techniques, communication switching systems, data communications, and communication theory. Join us in advancing the field of telecommunications through groundbreaking research and innovation.