Papers
Topics
Authors
Recent
Search
2000 character limit reached

The MAC Resolvability Region, Semantic Security and Its Operational Implications

Published 6 Oct 2017 in cs.IT and math.IT | (1710.02342v2)

Abstract: Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel (MAC) from the perspective of resolvability. In particular, we refine and extend the proof to obtain novel results on the second-order achievable rates. Then we characterize the resolvability region of the memoryless MAC by establishing a conceptually simple converse proof for resolvability that relies on the uniform continuity of Shannon's entropy with respect to the variational distance. We discuss the operational meaning of the information theoretic concept of semantic security from the viewpoint of Ahlswede's General Theory of Information Transfer and show interesting implications on the resilience against a large class of attacks even if no assumption can be made about the distributions of the transmitted messages. Finally we provide details on how the resolvability results can be used to construct a wiretap code that achieves semantic security.

Citations (13)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.