Secure Storage Capacity under Rate Constraints-Continuity and Super Activation

Research output: Contribution to journalResearch articleContributedpeer-review

Contributors

  • Sebastian Baur - , Technical University of Munich (Author)
  • Holger Boche - , Technical University of Munich, Munich Center for Quantum Science and Technology (MCQST) (Author)
  • Rafael F. Schaefer - , Technical University of Berlin (Author)
  • H. Vincent Poor - , Princeton University (Author)

Abstract

The source model for secret key generation with one way public communication refers to a setting in which a secret key should be agreed upon at two terminals. At both terminals correlated components of a common source are available. In addition, a message can be sent from one terminal to the other via a public channel. In this paper, a related scenario is considered where instead of secret key generation, the goal is to securely store data in a public database. The database allows for error-free storing of the data, but is constrained in its size which imposes a rate constraint on storing. The corresponding capacity for secure storage is known and it has been shown that the capacity-achieving strategy satisfies the strong secrecy criterion. Here, the case when the storage in the public database is subject to errors is considered and the corresponding capacity is characterized. In addition, the continuity properties of the two capacity functions are analyzed. These capacity functions are continuous as opposed to the discontinuous secret key capacity with rate constraint. It is shown that for secure storage the phenomenon of super activation can occur. Finally, it is discussed how the results in this paper differ from previous results on super activation.

Details

Original languageEnglish
Article number8766878
Pages (from-to)959-970
Number of pages12
JournalIEEE Transactions on Information Forensics and Security
Volume15
Publication statusPublished - 2020
Peer-reviewedYes
Externally publishedYes

External IDs

ORCID /0000-0002-1702-9075/work/165878270

Keywords

Keywords

  • continuity of capacity, rate constraint, Secret key (SK) generation, secure storage, super activation