Secure Storage Capacity under Rate Constraints-Continuity and Super Activation
Research output: Contribution to journal › Research article › Contributed › peer-review
Contributors
Abstract
The source model for secret key generation with one way public communication refers to a setting in which a secret key should be agreed upon at two terminals. At both terminals correlated components of a common source are available. In addition, a message can be sent from one terminal to the other via a public channel. In this paper, a related scenario is considered where instead of secret key generation, the goal is to securely store data in a public database. The database allows for error-free storing of the data, but is constrained in its size which imposes a rate constraint on storing. The corresponding capacity for secure storage is known and it has been shown that the capacity-achieving strategy satisfies the strong secrecy criterion. Here, the case when the storage in the public database is subject to errors is considered and the corresponding capacity is characterized. In addition, the continuity properties of the two capacity functions are analyzed. These capacity functions are continuous as opposed to the discontinuous secret key capacity with rate constraint. It is shown that for secure storage the phenomenon of super activation can occur. Finally, it is discussed how the results in this paper differ from previous results on super activation.
Details
Original language | English |
---|---|
Article number | 8766878 |
Pages (from-to) | 959-970 |
Number of pages | 12 |
Journal | IEEE Transactions on Information Forensics and Security |
Volume | 15 |
Publication status | Published - 2020 |
Peer-reviewed | Yes |
Externally published | Yes |
External IDs
ORCID | /0000-0002-1702-9075/work/165878270 |
---|
Keywords
ASJC Scopus subject areas
Keywords
- continuity of capacity, rate constraint, Secret key (SK) generation, secure storage, super activation