Motivated by applications to covert quantum radar, we analyze a covert quantum sensing problem, in which a legitimate user aims at estimating an unknown parameter taking finitely many values by probing a quantum channel while remaining undetectable from an adversary receiving the probing signals through another quantum channel. When channels are classical-quantum, we characterize the optimal error exponent under a covertness constraint for sensing strategies in which probing signals do not depend on past observations. When the legitimate user’s channel is a unitary depending on the unknown parameter, we provide achievability and converse results that show how one can significantly improve covertness using an entangled input state.
@article{Tahmasbi2020c, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R.}, journal = {IEEE Journal on Selected Areas in Information Theory}, title = {On Covert Quantum Sensing and the Benefits of Entanglement}, year = {2021}, issn = {2641-8770}, month = mar, number = {1}, pages = {352-365}, volume = {2}, doi = {10.1109/JSAIT.2021.3056640}, eprint = {2008.01264}, file = {:/Users/mbloch/Downloads/2021-Tahmasbi-JSAIT-On covert quantum sensing and the benefits of entanglement-pdfa.pdf:PDF}, groups = {NSF1910859}, howpublished = {accepted to \emph{IEEE Journal of Selected Areas in Information Theory}}, keywords = {Sensors;Quantum channel;Testing;Quantum entanglement;Channel estimation;Quantum state;Tensors;Quantum sensing;covert communication} }
We consider an enhanced measure of security for a quantum key distribution protocol, in which we require not only that the adversary obtains no information about the key but also remains unaware that a key generation protocol has been executed. When the adversary applies the same quantum channel independently to each transmitted quantum state, akin to a collective attack in the quantum key distribution literature, we propose a protocol that achieves covert and secret key expansion under mild restrictions. A crucial component of the protocol is a covert estimation stage, which is then combined with universal channel coding for reliability and resolvability in the covert regime.
@article{Tahmasbi2019a, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R}, journal = ieee_j_it, title = {Covert and secret key expansion over quantum channels under collective attacks}, year = {2020}, issn = {1557-9654}, month = nov, number = {11}, pages = {7113-7131}, volume = {66}, doi = {10.1109/TIT.2020.3021595}, file = {:2020-Tahmasbi-IEEETransIT-b.pdf:PDF}, groups = {NSF1910859}, howpublished = {accepted to \emph{IEEE Transactions on Information Theory}} }
We consider the problem of coding to ensure covert communication, which involves ensuring reliable communication between two legitimate parties while simultaneously guaranteeing a low probability of detection by an eavesdropper. Specifically, we develop an optimal low-complexity coding scheme that achieves the information-theoretic limits of covert communications over binary-input discrete memoryless channels (BI-DMCs). To justify our design, we first consider a regime in which information theory proves the possibility of covert communication without shared secret key and show the impossibility of achieving information-theoretic limits using linear codes without secret key. We then circumvent this impossibility by introducing non-linearity into the coding scheme through the use of pulse position modulation (PPM) and multilevel coding (MLC). This MLC-PPM scheme exhibits several appealing properties; in particular, for an appropriate decoder, the channel at a given level is independent of the total number of levels and the codeword length. We exploit these properties to show how one can use families of channel capacity- and channel resolvability-achieving codes to concretely instantiate a covert communication scheme.
@article{Kadampot2018a, author = {Kadampot, Ishaque Ashar and Tahmasbi, Mehrdad and Bloch, Matthieu R}, journal = ieee_j_it, title = {Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels}, year = {2020}, month = oct, number = {10}, pages = {6001-6023}, volume = {66}, doi = {10.1109/TIT.2020.3019996}, eprint = {1811.09695}, file = {:2020-Kadampot-IEEETransIT.pdf:PDF} }
We study several versions of a quantum steganography problem in which two legitimate parties attempt to conceal a cypher in a quantum cover transmitted over a quantum channel without arising suspicion from a warden who intercepts the cover. In all our models, we assume that the warden has an inaccurate knowledge of the quantum channel and we formulate several variations of the steganography problem depending on the tasks used as the cover and the cypher task. In particular, when the cover task is classical communication, we show that the cypher task can be classical communication or entanglement sharing; when the cover task is entanglement sharing and the main channel is noiseless, we show that the cypher task can be randomness sharing; when the cover task is quantum communication and the main channel is noiseless, we show that the cypher task can be classical communication. In the latter case, our results improve earlier ones by relaxing the need for a shared key between the transmitter and the receiver and hold under milder assumptions on the cover quantum communication code. We study several versions of a quantum steganography problem in which two legitimate parties attempt to conceal a cypher in a quantum cover transmitted over a quantum channel without arising suspicion from a warden who intercepts the cover. In all our models, we assume that the warden has an inaccurate knowledge of the quantum channel and we formulate several variations of the steganography problem depending on the tasks used as the cover and the cypher task. In particular, when the cover task is classical communication, we show that the cypher task can be classical communication or entanglement sharing; when the cover task is entanglement sharing and the main channel is noiseless, we show that the cypher task can be randomness sharing; when the cover task is quantum communication and the main channel is noiseless, we show that the cypher task can be classical communication. In the latter case, our results improve earlier ones by relaxing the need for a shared key between the transmitter and the receiver and hold under milder assumptions on the cover quantum communication code.
@article{Tahmasbi2020a, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R}, journal = {Journal of Mathematical Physics}, title = {Steganography Protocols for Quantum Channels}, year = {2020}, month = aug, number = {8}, pages = {082201}, volume = {61}, doi = {10.1063/5.0004731}, eprint = {1907.09602}, file = {:2020-Tahmasbi-JMP.pdf:PDF}, groups = {NSF1910859}, howpublished = {accepted to \emph{Journal of Mathematical Physics}} }
We propose a protocol based on pulse-position modulation and multi-level coding that allows one to bootstrap traditional quantum key distribution protocols while ensuring covertness, in the sense that no statistical test by the adversary can detect the presence of communication over the quantum channel better than a random guess. When run over a bosonic channel, our protocol can leverage existing discrete-modulated continuous-variable protocols. Since existing techniques to bound Eve’s information do not directly apply, we develop a new bound that results in positive, although very low, throughput for a range of channel parameters. The analysis of the protocol performance shows that covert secret key expansion is possible using a public authenticated classical channel and a quantum channel largely but not fully under the control of an adversary, which we precisely define. We also establish a converse result showing that, under the golden standard of quantum key distribution, by which the adversary completely controls the quantum channel, no covert key generation is possible.We propose a protocol based on pulse-position modulation and multi-level coding that allows one to bootstrap traditional quantum key distribution protocols while ensuring covertness, in the sense that no statistical test by the adversary can detect the presence of communication over the quantum channel better than a random guess. When run over a bosonic channel, our protocol can leverage existing discrete-modulated continuous-variable protocols. Since existing techniques to bound Eve’s information do not directly apply, we develop a new bound that results in positive, although very low, throughput for a range of channel parameters. The analysis of the protocol performance shows that covert secret key expansion is possible using a public authenticated classical channel and a quantum channel largely but not fully under the control of an adversary, which we precisely define. We also establish a converse result showing that, under the golden standard of quantum key distribution, by which the adversary completely controls the quantum channel, no covert key generation is possible.
@article{Tahmasbi2020, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R.}, journal = {IEEE Journal on Selected Areas in Information Theory}, title = {Towards Undetectable Quantum Key Distribution over Bosonic Channels}, year = {2020}, month = aug, number = {2}, pages = {585-598}, volume = {1}, doi = {10.1109/JSAIT.2020.3017212}, eprint = {1904.12363}, file = {:2020-Tahmasbi-IEEEJSAIT-Towards Undetectable Quantum Key Distribution Over Bosonic Channels.pdf:PDF}, groups = {NSF1910859}, howpublished = {accepted to \emph{IEEE Journal of Selected Topics in Information Theory}} }
We investigate the problem of covert and secret key generation over a state-dependent discrete memoryless channel with one-way public discussion in which an adversary, the warden, may arbitrarily choose the channel state. We develop an adaptive protocol that, under conditions that we explicitly specify, not only allows the transmitter and the legitimate receiver to exchange a secret key but also conceals from the active warden whether the protocol is being run. When specialized to passive adversaries that do not control the channel state, we partially characterize the covert secret key capacity. In particular, the covert secret key capacity is sometimes equal to the covert capacity of the channel, so that secrecy comes "for free."
@article{Tahmasbi2019, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R}, journal = ieee_j_ifs, title = {Covert Secret Key Generation with an Active Warden}, year = {2020}, month = jun, pages = {1026-1039}, volume = {15}, doi = {10.1109/TIFS.2019.2932906}, doneatgt = {yes}, eprint = {1901.02044}, file = {:2020-Tahmasbi-IEEETransIFS.pdf:PDF}, groups = {Steganography and covert communications}, howpublished = {accepted to \emph{IEEE Transactions on Information Forensics and Security}} }
The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden. It is shown that the covert capacity is achieved with an amplitude-constrained input distribution that consists of a finite number of mass points including one at zero and numerically tractable bounds are provided. It is also conjectured that distributions with two mass points in fixed locations are optimal.
@article{Tahmasbi2018a, author = {Tahmasbi, Mehrdad and Savard, Anne and Bloch, Matthieu R}, journal = ieee_j_it, title = {Covert Capacity of Non-Coherent Rayleigh-Fading Channels}, year = {2020}, issn = {0018-9448}, month = apr, number = {4}, pages = {1979-2005}, volume = {66}, doi = {10.1109/TIT.2019.2956489}, eprint = {1810.07687}, file = {:2020-Tahmasbi-IEEETransIT.pdf:PDF}, groups = {Steganography and covert communications}, howpublished = {accepted to \emph{IEEE Transactions on Information Theory}} }
Secure communication over a wiretap channel is investigated, in which an active adversary modifies the state of the channel and the legitimate transmitter has the opportunity to sense and learn the adversary’s actions. The adversary has the ability to switch the channel state and observe the corresponding output at every channel use while the encoder has causal access to observations that depend on the adversary’s actions. A joint learning/transmission scheme is developed in which the legitimate users learn and adapt to the adversary’s actions. For some channel models, it is shown that the achievable rates, defined precisely for the problem, are arbitrarily close to those obtained with hindsight, had the transmitter known the actions ahead of time. This initial study suggests that there is much to exploit and gain in physical-layer security by learning the adversary, e.g., monitoring the environment.
@article{Tahmasbi2018, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R. and Yener, Aylin}, journal = ieee_j_it, title = {Learning an Adversary's Actions for Secret Communication}, year = {2020}, month = mar, number = {3}, pages = {1607--1624}, volume = {66}, doi = {10.1109/TIT.2019.2940960}, eprint = {1807.08670}, file = {:2020-Tahmasbi-IEEETransIT-a.pdf:PDF}, howpublished = {accepted to \emph{IEEE Transactions on Information Theory}} }
Covert and secret quantum key distribution aims at generating information-theoretically secret bits between distant legitimate parties in a manner that remains provably undetectable by an adversary. We propose a framework in which to precisely define and analyze such an operation, and we show that covert and secret key expansion is possible. For fixed and known classical-quantum wiretap channels, we develop and analyze protocols based on forward and reverse reconciliation. The crux of our approach is the use of information reconciliation and privacy amplification techniques that are able to process the sparse signals required for covert operation and the Shannon entropy of which scales as the square root of their length. In particular, our results show that the coordination required between legitimate parties to achieve covert communication can be achieved with a negligible number of secret key bits.
@article{Tahmasbi2018b, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R.}, journal = {Physical Review A}, title = {Framework for covert and secret key expansion over classical-quantum channels}, year = {2019}, month = may, pages = {052329}, volume = {99}, doi = {10.1103/PhysRevA.99.052329}, eprint = {1811.05626}, file = {:2019-Tahmasbi-PRA.pdf:PDF}, groups = {Quantum information science}, issue = {5}, numpages = {11}, publisher = {American Physical Society} }
We study the first- and second-order asymptotics of covert communication over binary-input DMC for three different covertness metrics and under maximum probability of error constraint. When covertness is measured in terms of the relative entropy between the channel output distributions induced with and without communication, we characterize the exact first- and second-order asymptotics of the number of bits that can be reliably transmitted with a maximum probability of error less than εand a relative entropy less than δ. When covertness is measured in terms of the variational distance between the channel output distributions or in terms of the probability of missed detection for fixed probability of false alarm, we establish the exact first-order asymptotics and bound the second-order asymptotics. PPM achieves the optimal first-order asymptotics for all three metrics, as well as the optimal second-order asymptotics for relative entropy. The main conceptual contribution of this paper is to clarify how the choice of a covertness metric impacts the information-theoretic limits of covert communications. The main technical contribution underlying our results is a detailed expurgation argument to show the existence of a code satisfying the reliability and covertness criteria.
@article{Tahmasbi2017, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R}, journal = ieee_j_it, title = {First and Second Order Asymptotics in Covert Communication}, year = {2019}, month = apr, number = {4}, pages = {2190 --2212}, volume = {65}, doi = {10.1109/TIT.2018.2878526}, eprint = {1703.01362}, file = {:2019-Tahmasbi-IEEETransIT.pdf:PDF}, groups = {Steganography and covert communications} }
@inproceedings{Tahmasbi2021, author = {Tahmasbi, Mehrdad and Bash, Boulat and Guha, Saikat and Bloch, Matthieu R}, booktitle = ieee_isit, title = {Signaling for Covert Quantum Sensing}, year = {2021}, month = jul, pages = {1041-1045}, doi = {10.1109/ISIT45174.2021.9517722}, file = {:2021-Tahmasbi-ISIT-Signaling for Covert Quantum Sensing.pdf:PDF}, groups = {NSF1910859}, howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}} }
We formalize the problem of active covert sensing, in which a legitimate user wants to not only sense an unknown parameter but also remain undetectable from an adversary by actively controlling the actions that generate observations. We characterize the optimal achievable error exponent when the actions of the legitimate user do not depend on the past observations. When the actions are allowed to depend on the past observations, we provide an example showing the benefits of adaptivity.
@inproceedings{Tahmasbi2020b, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R}, booktitle = ieee_isit, title = {Active Covert Sensing}, year = {2020}, address = {Los Angeles, CA}, month = jun, pages = {840-845}, doi = {10.1109/ISIT44484.2020.9174220}, file = {:2020-Tahmasbi-ISIT-Active Covert Sensing.pdf:PDF}, howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}} }
In covert communication, a transmitter attempts to send a message over a channel while avoiding detection from a warden. We investigate here how the warden’s knowledge of the code used by the transmitter and the receiver influences the optimal number of bits that can be covertly and reliably sent. We formulate the problem in three scenarios: the warden completely knows the code, the warden knows only the rate and an upper-bound on the probability of error at the decoder, and the warden has access to previous samples of its channel when the code was used. The first scenario corresponds to the standard model in covert communication. For the second scenario, we characterize the number of bits that can be transmitted reliably subject to a covertness constraint up to the first-order of asymptotics. Finally, for the third scenario, we provide lower-and upper-bound on the number of bits that can be transmitted reliably subject to a covertness constraint for two scalings of the number of observed samples.
@inproceedings{Tahmasbi2019d, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R.}, booktitle = {Proc. of Allerton Conference on Communication, Control and Computing}, title = {Covert Communication with Unknown Code at the Warden}, year = {2019}, address = {Monticello, IL}, month = sep, pages = {1060--1067}, doi = {10.1109/ALLERTON.2019.8919792}, file = {:2019-Tahmasbi-Allerton.pdf:PDF}, groups = {Steganography and covert communications}, isbn = {978-1-7281-3152-8}, keywords = {Reliability, Transmitters, Receivers, Zinc, Decoding, Standards, AWGN channels}, location = {Monticello, IL, USA} }
@inproceedings{Kadampot2019a, author = {Kadampot, Ishaque Ashar and Tahmasbi, Mehrdad and Bloch, Matthieu R.}, booktitle = ieee_itw, title = {Forward Reconciliation for Covert Key Generation}, year = {2019}, address = {Visby, Sweden}, month = aug, pages = {1--5}, doi = {10.1109/ITW44776.2019.8989274}, file = {:2019-Kadampot-ITW.pdf:PDF}, howpublished = {accepted to \emph{IEEE Information Theory Workshop}} }
We propose a model of secure communication over wireless channels in which the legitimate parties leverage Radio Tomographic Imaging (RTI) to learn the adversary. Specifically, we model the results of RTI as an "in band" sensing channel that provides causal information about the eavesdropper’s path-loss to the transmitter. This ability to learn the path-loss is exploited to achieve secrecy, even in presence of an eavesdropper that moves to optimize its path-loss and improves its eavesdropping. We show that the secrecy rates achieved are the same as those that would have been obtained with hindsight, had the transmitter known the average path-loss ahead of time.
@inproceedings{Tahmasbi2019c, author = {Tahmasbi, Mehrdad and Bloch, Matthieu and Yener, Aylin}, title = {In-Band Sensing of the Adversary's Channel for Secure Communication in Wireless Channels}, booktitle = ieee_isit, year = {2019}, pages = {2184-2188}, address = {Paris, France}, month = jul, doi = {10.1109/ISIT.2019.8849506}, file = {:2019-Tahmasbi-ISIT2.pdf:PDF}, howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}} }
@inproceedings{Tahmasbi2019b, author = {Tahmasbi, Mehrdad and Bloch, Matthieu}, booktitle = ieee_isit, title = {Steganography Protocols for Quantum Channels}, year = {2019}, address = {Paris, France}, month = jul, pages = {2179-2183}, file = {:2019-Tahmasbi-ISIT.pdf:PDF}, howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}} }
We propose a coding scheme for covert communication over additive white Gaussian noise channels, which extends a previous construction for discrete memoryless channels. We first show how sparse signaling with On-Off keying fails to achieve the covert capacity but that a modification allowing the use of binary phase-shift keying for "on" symbols recovers the loss. We then construct a modified pulse-position modulation scheme that, combined with multilevel coding, can achieve the covert capacity with low-complexity error-control codes. The main contribution of this work is to reconcile the tension between diffuse and sparse signaling suggested by earlier information-theoretic results.
@inproceedings{Kadampot2019, author = {Kadampot, Ishaque Ashar and Tahmasbi, Mehrdad and Bloch, Matthieu R}, title = {Codes for Covert Communication over Additive White Gaussian Noise Channels}, booktitle = ieee_isit, year = {2019}, pages = {977-981}, address = {Paris, France}, month = jul, doi = {10.1109/ISIT.2019.8849662}, file = {:2019-Kadampot-ISIT.pdf:PDF}, howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}} }
We develop a low-complexity coding scheme to achieve covert communications over binary symmetric channels. We circumvent the impossibility of covert communication with linear codes by introducing non-linearity through the use of pulse-position modulation (PPM) and multilevel coding (MLC). We show that the MLC-PPM scheme exhibits many appealing properties, in particular, the channel at a given index level remains the same as the number of level increases, which allows one to use families of capacity- and resolvability-achieving codes to concretely instantiate the covert communication scheme.
@inproceedings{Kadampot2018, author = {Kadampot, Ishaque Ashar and Tahmasbi, Mehrdad and Bloch, Matthieu R.}, title = {Multilevel-Coded Pulse Position Modulation for Covert Communications}, booktitle = ieee_isit, year = {2018}, pages = {1864--1868}, address = {Vail, CO}, month = jun, doi = {10.1109/ISIT.2018.8437587}, file = {:2018-Kadampot-ISIT.pdf:PDF}, groups = {Steganography and covert communications}, howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}} }
We define and study the error exponent of covert communications over binary-input Discrete Memoryless Channels (DMCs). Our main result consists of upper and lower bounds for the exponent, which match in a regime that we explicitly characterize. While our proofs follow standard techniques, the vanishing rate regime inherent to covert communications and the low-weight of codewords introduces specific technical challenges. In particular, the lower bound of the error exponent follows from a non-standard constant-composition ensemble instead of an independent and identically distributed (i.i.d.) ensemble, and the upper bound requires a careful treatment that does not appear in the traditional analysis of error exponent.
@inproceedings{Tahmasbi2017b, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R and Tan, Vincent F}, title = {Error exponents covert communications}, booktitle = ieee_itw, year = {2017}, pages = {304-308}, address = {Kaohsiung, Taiwan}, month = nov, doi = {10.1109/ITW.2017.8278024}, file = {:2017-Tahmasbi-ITW.pdf:PDF}, groups = {Steganography and covert communications} }
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert secret key capacity is sometimes equal to the covert capacity of the channel, so that secrecy comes �for free.� Our main contribution is the analysis of a protocol that exploits the likelihood encoder to circumvent source coding with side information and privacy amplification.
@inproceedings{Tahmasbi2017c, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R.}, title = {Covert secret key generation}, booktitle = {Proc. of IEEE Conference on Communications and Network Security, Workshop on Physical-Layer Methods for Wireless Security}, year = {2017}, pages = {540-544}, address = {Las Vegas, NV}, month = oct, doi = {10.1109/CNS.2017.8228681}, groups = {Steganography and covert communications, Secret key agreement}, keywords = {Communication networks;Communication system security;Conferences;Privacy;Protocols;Security;Throughput} }
We analyze the problem of secure communication over a wiretap channel with an active adversary, in which the legitimate transmitter has the opportunity to sense and learn the adversary’s actions. Specifically, the adversary has the ability to switch between two channels and to observe the corresponding output at every channel use; the encoder, however, has causal access to observations impacted by adversary’s actions. We develop a joint learning/transmission scheme in which the legitimate users learn and adapt to the adversary’s actions. For some channel models, we show that the achievable rates, which we define precisely, are arbitrarily close to those obtained with hindsight, had the transmitter known the actions ahead of time. This suggests that there is much to exploit and gain in physical-layer security by monitoring the environment.
@inproceedings{Tahmasbi2017a, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R and Yener, Aylin}, title = {Learning Adversary's Actions for Secret Communication}, booktitle = ieee_isit, year = {2017}, pages = {2713--2717}, address = {Aachen, Germany}, month = jun, doi = {10.1109/ISIT.2017.8007021}, file = {:2017-Tahmasbi-ISIT.pdf:PDF}, groups = {Adversarial models}, howpublished = {accepted to \emph{IEEE International Symposium on Information Theory}} }
We develop three new results regarding the second-order asymptotics of secure communication over wiretap channels. We first establish the optimal second-order asymptotics for a class of degraded wiretap channels without feedback under an effective secrecy criterion. We then derive the optimal second-order asymptotics for degraded wiretap channels with feedback. We finally develop a new converse bound for channel resolvability with non-capacity achieving distributions, which we use to develop useful converse bounds for asymmetric degraded wiretap channels. Our results are illustrated with several numerical examples, and suggest that known coding techniques already achieve their best performance.
@inproceedings{Tahmasbi2016a, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R.}, booktitle = {54th Annual Allerton Conference on Communication, Control, and Computing}, title = {Second Order Asymptotics for Degraded Wiretap Channels: How Good Are Existing Codes?}, year = {2016}, address = {Monticello, IL}, month = sep, pages = {830-837}, doi = {10.1109/ALLERTON.2016.7852319}, groups = {Wiretap channels}, keywords = {encoding;telecommunication security;asymmetric degraded wiretap channels;channel resolvability;converse bound;effective secrecy criterion;existing codes;known coding techniques;optimal second-order asymptotics;secure communication;Decoding;Encoding;Measurement;Monte Carlo methods;Receivers;Reliability;Transmitters} }
We consider the problem of covert communication over noisy binary input Discrete Memoryless Channels (DMCs). Covertness is measured with respect to an adversary in terms of the divergence between the channel output distribution induced with and without communication. We characterize the exact second order asymptotics of the number of bits that can be reliably transmitted with a probability of error less than epsilon and a divergence less than delta. The main technical contribution of this paper is a detailed analysis of how to expurgate a random code while maintaining its channel resolvability properties.
@inproceedings{Tahmasbi2016, author = {Tahmasbi, Mehrdad and Bloch, Matthieu R.}, booktitle = ieee_isit, title = {Second-Order Asymptotics of Covert Communications over Noisy Channels}, year = {2016}, address = {Barcelona, Spain}, month = jul, pages = {2224-2228}, creationdate = {2016-01-26T00:00:00}, doi = {10.1109/ISIT.2016.7541694}, groups = {Steganography and covert communications}, keywords = {Encoding;Monte Carlo methods;Noise measurement;Random variables;Reliability;Zinc}, owner = {mattbloch} }