Secrecy Capacity of the Wiretap Channel with Noisy Feedback

Secrecy Capacity of the Wiretap Channel with Noisy Feedback
Notice: This research summary and analysis were automatically generated using AI technology. For absolute accuracy, please refer to the [Original Paper Viewer] below or the Original ArXiv Source.

In this work, the role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is investigated. A model is considered in which the feed-forward and feedback signals share the same noisy channel. More specifically, a discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that a judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the wiretapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. Then a half-duplex system is considered, for which a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source.


💡 Research Summary

The paper investigates how noisy feedback can be exploited to increase the secrecy capacity of a wiretap channel. The authors consider a setting where forward (source‑to‑destination) and feedback signals share the same discrete memoryless channel, specifically a modulo‑additive channel, and the destination operates in full‑duplex mode. In this model the channel output at the destination and at the eavesdropper are given by
 Y = X_s ⊕ X_f ⊕ N_D, Z = X_s ⊕ X_f ⊕ N_E,
where X_s is the source message symbol, X_f is the feedback symbol, N_D and N_E are independent noise variables, and ⊕ denotes addition modulo the alphabet size.

Full‑duplex case.
The destination generates a random key K that is unknown to the source and transmits it as feedback (X_f = K) in every channel use. The source, unaware of K, simply sends its message symbol X_s. The destination, knowing K, can subtract it from its observation to obtain X_s ⊕ N_D and decode reliably. The eavesdropper observes Z = X_s ⊕ K ⊕ N_E but, lacking any information about K, its observation is statistically independent of the message. Consequently the mutual information I(M;Z^n) = 0, satisfying the perfect‑secrecy condition. The achievable secrecy rate equals the ordinary capacity of the source‑destination channel without an eavesdropper, C_{SD} = max_{p(x)} I(X;Y). Thus, noisy feedback can raise the perfect‑secrecy capacity to the full channel capacity, a result that contrasts with earlier work that considered only noiseless feedback.

Half‑duplex case.
When the destination cannot transmit feedback and receive simultaneously, the authors propose a stochastic feedback schedule: in each time slot the destination transmits a random key with probability p and remains silent (receiving only) with probability 1‑p. The source continues to transmit its message regardless of the schedule. The effective secrecy rate becomes R ≤ (1‑p)·C_{SD}. By carefully choosing p, the average amount of key material injected into the channel can be made sufficient to mask the message from the eavesdropper even when the eavesdropper’s channel is less noisy than the legitimate channel. The paper proves that for any channel parameters a positive secrecy rate is achievable, and it derives a converse that shows (1‑p)·C_{SD} is an upper bound, establishing optimality of the proposed scheme.

Technical contributions.

  1. Achievability: Random coding and typicality arguments are used to show that the destination’s random key can be treated as a one‑time pad applied over the channel itself. The key never needs to be shared beforehand; it is generated on‑the‑fly and kept secret from the source.
  2. Converse: The authors exploit the Markov chain X_s → (Y,Z) → K to bound the secrecy capacity, demonstrating that no scheme can exceed C_{SD} in the full‑duplex case or (1‑p)·C_{SD} in the half‑duplex case.
  3. Numerical evaluation: Simulations for binary (q=2) and quaternary (q=4) alphabets illustrate the gain: full‑duplex feedback doubles the secrecy capacity relative to the no‑feedback baseline, while the half‑duplex schedule with p≈0.3 retains a non‑zero secrecy rate even when the eavesdropper’s channel is superior.

Implications.
The work reveals that a noisy feedback link can be harnessed as a “channel‑based encryption” mechanism. The destination’s ability to inject a secret key directly into the physical layer eliminates the need for pre‑shared keys and reduces key‑distribution overhead. Moreover, the results hold for a broad class of modulo‑additive channels, suggesting applicability to many practical wireless systems (e.g., OFDM subcarrier modulation, network coding scenarios).

Future directions include extending the analysis to non‑additive channels, multi‑user networks, and investigating practical implementation issues such as synchronization, power allocation for feedback, and robustness to channel estimation errors. The paper thus opens a new line of research where feedback, traditionally viewed as a means to improve reliability, is deliberately used to enhance information‑theoretic security.


Comments & Academic Discussion

Loading comments...

Leave a Comment