|Wednesday, December 7|
|10:00 - 11:00|
|Keynote: ITSP-K1: H. Vincent Poor - Secure Broadcasting with Independent Secret Keys|
|11:00 - 12:20|
|ITSP-1: Information Theoretic Approaches to Security and Privacy I|
|14:00 - 15:00|
|Keynote: ITSP-K2: Ashish Khisti - The MIMOME Channel|
|14:00 - 15:40|
|ITSP-2: Information Theoretic Approaches to Security and Privacy II|
|16:10 - 17:30|
|ITSP-P1: Information Theoretic Approaches to Security and Privacy Poster|
Information Theoretic Security (ITS) was introduced by Claude Shannon in 1948. In Shannon's setting the legitimate parties share a common secret key but communicate over a public noiseless channel, which can be wiretapped by an eavesdropper. Shannon's main result was to establish the minimum key-rate necessary to guarantee ITS against the eavesdropper. Wyner introduced the wiretap channel in 1975, where the legitimate parties communicate over a (possibly) noisy channel, which could be wiretapped by an eavesdropper over another noisy channel. Wyner established the maximum communication rate in this setting, while guaranteeing ITS (in an asymptotic sense) against the eavesdropper.
In this talk we will review the above results and then introduce a new setting where a single (common) message must be transmitted to two receivers over a wiretap channel. In addition we assume that the transmitter shares an independent secret key with each of the two receivers not known to the eavesdropper. We will explain how the coding techniques developed by Shannon and Wyner can be unified in this setting. By focusing on the "degraded" channel model, we will discuss conditions under which the following approaches are optimal (i) using secret-keys as one-time pads and ignoring the contribution of the noisy channel (ii) ignoring the secret-keys and only relying on the noisy channel (iii) hybrid schemes that combine both approaches.
While multiple antennas provide a natural mechanism for securing wireless communications at a physical layer, both the fundamental limits and practical coding schemes for the Multi-Input-Multi-Output-Multi-Eavesdropper (MIMOME) channel have only been developed in the last few years.
We first discuss how to design a layered coding scheme for the MIMOME channel that achieves the secrecy capacity. Our scheme only uses codes for the scalar wiretap channel, and successive interference cancellation at the receiver, as in traditional V-Blast schemes. Our approach is based on simultaneous joint unitary triangularization of the channel matrices of the legitimate user and the eavesdropper. As a byproduct it also provides a more transparent understanding of the structure of the optimal covariance matrix for the MIMOME channel.
In the second part of the talk we will consider the case when there are only a limited number of RF chains in the MIMOME system. We will discuss how Artificial Noise based Secure-MIMO schemes can be used in such systems, and discuss the constraints on the beam-forming vectors, and propose some novel solutions to these.
The Symposium on Information Theoretic Approaches to Security and Privacy will take place during IEEE GlobalSIP 2016 in Washington, D.C., USA, Dec 7-9, 2016. Previously unpublished contributions in information theoretic security and privacy for information systems are solicited.
Submissions are welcome on topics including:
Prospective authors are invited to submit papers of of sufficient length and detail for review by experts in the field. Final papers will be limited to 6 pages in length. Manuscripts should be original (not submitted/published anywhere else) and written in accordance with the standard IEEE double-column paper template. Submission is through the GlobalSIP website at http://2016.ieeeglobalsip.org/Papers.asp.
|Paper Submission Deadline|
|Review Results Announced|
|Camera-Ready Papers Due||September 30, 2016|