TY - GEN
T1 - Providing secrecy with lattice codes
AU - He, Xiang
AU - Yener, Aylin
PY - 2008
Y1 - 2008
N2 - Recent results have shown that lattice codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. On the other hand, for Gaussian channels with secrecy constraints, efforts to date rely on random codes. In this work, we provide a tool to bridge these two areas so that the secrecy rate can be computed when lattice codes are used. In particular, we address the problem of bounding equivocation rates under nonlinear modulus operation that is present in lattice encoders/decoders. The technique is then demonstrated in two Gaussian channel examples: (1) a Gaussian wiretap channel with a cooperative jammer, and (2) a multi-hop line network from a source to a destination with untrusted intermediate relay nodes from whom the information needs to be kept secret. In both cases, lattice codes are used to facilitate cooperative jamming. In the second case, interestingly, we demonstrate that a non-vanishing positive secrecy rate is achievable regardless of the number of hops.
AB - Recent results have shown that lattice codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. On the other hand, for Gaussian channels with secrecy constraints, efforts to date rely on random codes. In this work, we provide a tool to bridge these two areas so that the secrecy rate can be computed when lattice codes are used. In particular, we address the problem of bounding equivocation rates under nonlinear modulus operation that is present in lattice encoders/decoders. The technique is then demonstrated in two Gaussian channel examples: (1) a Gaussian wiretap channel with a cooperative jammer, and (2) a multi-hop line network from a source to a destination with untrusted intermediate relay nodes from whom the information needs to be kept secret. In both cases, lattice codes are used to facilitate cooperative jamming. In the second case, interestingly, we demonstrate that a non-vanishing positive secrecy rate is achievable regardless of the number of hops.
UR - http://www.scopus.com/inward/record.url?scp=64549085982&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=64549085982&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2008.4797696
DO - 10.1109/ALLERTON.2008.4797696
M3 - Conference contribution
AN - SCOPUS:64549085982
SN - 9781424429264
T3 - 46th Annual Allerton Conference on Communication, Control, and Computing
SP - 1199
EP - 1206
BT - 46th Annual Allerton Conference on Communication, Control, and Computing
T2 - 46th Annual Allerton Conference on Communication, Control, and Computing
Y2 - 24 September 2008 through 26 September 2008
ER -