Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. Threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in contrast
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.
標簽:
Fundamental
Limits
Secure
Class
on
of
上傳時間:
2020-01-04
上傳用戶:kddlas
The basic topic of this book is solving problems from system and control theory using
convex optimization. We show that a wide variety of problems arising in system
and control theory can be reduced to a handful of standard convex and quasiconvex
optimization problems that involve matrix inequalities. For a few special cases there
are “analytic solutions” to these problems, but our main point is that they can be
solved numerically in all cases. These standard problems can be solved in polynomial-
time (by, e.g., the ellipsoid algorithm of Shor, Nemirovskii, and Yudin), and so are
tractable, at least in a theoretical sense. Recently developed interior-point methods
for these standard problems have been found to be extremely efficient in practice.
Therefore, we consider the original problems from system and control theory as solved.
標簽:
Linear_Matrix_Inequalities_in_Sys
tem
上傳時間:
2020-06-10
上傳用戶:shancjb