D:\sbornik\...\tpel.DVI Mathematical Problems of Computer Science 36, 79{90, 2012. Random Coding B ound for Secr ecy E-capacity Region of the B r oadcast Channel With T wo Con¯dential M essages N a s r in A fs h a r , E vg u e n i H a r o u t u n ia n a n d Ma r ia m H a r o u t u n ia n Institute for Informatics and Automation Problems of NAS of RA e-mail: evhar@ipia.sci.am Abstract We study secrecy E-capacity region of the discrete memoryless broadcast chan- nel with two independent con¯dential messages sent to two receivers (BC-2CM). The system involves two sources, one encoder, two discrete memoryless channels and two receivers. Each private message is sent to the corresponding receiver while keeping the other receiver in total ignorance of it. The level of ignorance is measured by the equivocation rate. E-capacity region is the set of rate pairs R1; R2 of codes with given error probability exponents (reliabilities) E1; E2 at respective receivers. We derived a random coding bound for secrecy E-capacity region of the BC-2CM. When error probability exponents are going to zero, this bound coincides with the inner bound of secrecy capacity region of the BC-2CM obtained by R. Liu, I. Maric, P. Spasojevic and R. Yates. Key words: Broadcast channel with con¯dential messages, secrecy E-capacity, equivocation rate, error probability exponent, method of types, random coding bound. Refer ences [1 ] T. M. Co ve r , \ B r o a d c a s t c h a n n e ls " , IE E E Trans. Inf. Theory, vo l. IT-1 8 , n o . 1 , p p . 2 -1 4 , 1 9 7 2 . [2 ] T. M. Co ve r a n d J. A . Th o m a s , \ E lements of Information Theory" , 2 n d e d it io n , A W ile y-In t e r s c ie n c e P u b lic a t io n , 2 0 0 6 . [3 ] I. Cs is z ¶a r a n d J. K Äo r n e r , \ B r o a d c a s t c h a n n e l wit h c o n ¯ d e n t ia l m e s s a g e s " , IE E E Trans. Inf. Theory, vo l. IT-2 4 , n o . 3 , p p . 3 3 9 -3 4 8 , 1 9 7 8 . [4 ] I. Cs is z ¶a r a n d J. K Äo r n e r , \ Information Theory: Coding Theorems for D iscrete M emo- ryless Systems " , N e w Y o r k, W ile y, 1 9 8 1 . [5 ] S . I. Ge lfa n d a n d M. S . P in s ke r , \ Ca p a c it y o f b r o a d c a s t c h a n n e l wit h o n e d e t e r m in is t ic c o m p o n e n t " , P robl. P ered. Inf., vo l. 1 6 , n o . 1 , p p . 1 7 -2 5 , 1 9 8 0 . [6 ] E . A . H a r o u t u n ia n , \ U p p e r e s t im a t e o f t r a n s m is s io n r a t e fo r m e m o r yle s s c h a n n e l wit h c o u n t a b le n u m b e r o f o u t p u t s ig n a ls u n d e r g ive n e r r o r p r o b a b ilit y e xp o n e n t " , ( in R u s - s ia n ) 3rd All Union Conference on Theory of Information Transmission and Coding, Uzhgorod, P ublishing House of the Uzbek Academy of Sciences, p p . 8 3 -8 6 , 1 9 6 7 . 7 9 8 0 Random Coding Bound for Secrecy E-capacity Region of the Broadcast Channel [7 ] E . A . H a r o u t u n ia n , B . B e lb a s h ir , \ L o we r b o u n d o f t h e o p t im a l t r a n s m is s io n r a t e d e - p e n d in g o n g ive n e r r o r p r o b a b ilit y e xp o n e n t fo r d is c r e t e m e m o r yle s s c h a n n e l a n d fo r a s ym m e t r ic b r o a d c a s t c h a n n e l" , ( in R u s s ia n ) , Abstracts of P apers of 6th Int. Symp. Inf. Theory, Tashkent, USSR , vo l. 1 , p p . 1 9 -2 1 , 1 9 8 4 . [8 ] E . A . H a r o u t u n ia n , \ On B o u n d s fo r E -Ca p a c it y o f D MC" , IE E E Trans. Inf. Theory, vo l. IT-5 3 , n o . 1 1 , p p . 4 2 1 0 -4 2 2 0 , 2 0 0 7 . [9 ] E . A . H a r o u t u n ia n , M. E . H a r o u t u n ia n a n d A . N . H a r u t yu n ya n , \ R e lia b ilit y c r it e r ia in in fo r m a t io n t h e o r y a n d in s t a t is t ic a l h yp o t h e s is t e s t in g " , F oundations and Trends in Communications and Information Theory, vo l. 4 , n o s . 2 -3 , 2 0 0 8 . [1 0 ] E . A . H a r o u t u n ia n , M. E . H a r o u t u n ia n a n d N . A fs h a r , \ R a n d o m Co d in g B o u n d fo r E-c a p a c it y R e g io n o f t h e W ir e t a p Ch a n n e l" , 8th International Conference of Computer Science and Information Technologies, Yerevan, p p . 1 2 1 -1 2 4 , 2 0 1 1 . [1 1 ] M. E . H a r o u t u n ia n , \ R a n d o m c o d in g b o u n d fo r E-c a p a c it y r e g io n o f t h e b r o a d c a s t c h a n n e l" , M athematical P roblems of Computer Science, n o . 2 1 , p p . 5 0 -6 0 , 2 0 0 0 . [1 2 ] M. H a ya s h i , R . Ma t s u m o t o , \ U n ive r s a lly a t t a in a b le e r r o r a n d in fo r m a t io n e xp o n e n t s fo r t h e b r o a d c a s t c h a n n e ls wit h c o n ¯ d e n t ia l m e s s a g e s " , Arxiv:1104.4285v2 [cs.IT], 2 4 A p r il 2 0 1 1 . [1 3 ] Y . L ia n g , H . V . P o o r a n d S . S h a m a i, \ In fo r m a t io n t h e o r e t ic s e c u r it y" , F oundations and Trends in Communications and Information Theory, vo l. 5 , n o s . 4 -5 , 2 0 0 9 . [1 4 ] R . L iu , I. Ma r ic , P . S p a s o je vic a n d R . Y a t e s , \ D is c r e t e m e m o r yle s s in t e r fe r e n c e a n d b r o a d c a s t c h a n n e ls wit h c o n ¯ d e n t ia l m e s s a g e s : s e c r e c y r a t e r e g io n s " , IE E E Trans. Inf. Theory, vo l. 5 4 , n o . 6 , p p . 2 4 9 3 -2 5 0 7 , 2 0 0 8 . [1 5 ] K . Ma r t o n , \ A c o d in g t h e o r e m fo r t h e d is c r e t e m e m o r yle s s b r o a d c a s t c h a n n e l" , IE E E Trans. Inf. Theory, vo l. IT-2 5 , n o . 3 , p p . 3 0 6 -3 1 1 , 1 9 7 9 . [1 6 ] C. E . S h a n n o n , \ A m a t h e m a t ic a l t h e o r y o f c o m m u n ic a t io n " , B ell Syst. Tech. J .,| vo l. 2 7 , n o . 3 , p p . 3 7 9 -4 2 3 , 1 9 4 8 . 3 8 , n o . 5 , p p . 6 1 1 -6 5 9 , 1 9 5 9 . [1 7 ] A . D . W yn e r , \ Th e wir e -t a p c h a n n e l" , B ell Syst. Tech. J ., vo l. 5 4 , n o . 8 , p p . 1 3 5 5 -1 3 8 7 , 1 9 7 5 . [1 8 ] J. X u , Y . Ca o a n d B . Ch e n , \ Ca p a c it y b o u n d fo r b r o a d c a s t c h a n n e ls wit h c o n ¯ d e n t ia l m e s s a g e s " , IE E E Trans. Inf. Theory, vo l. 5 5 , n o . 1 0 , p p . 4 5 2 9 -4 5 4 2 , 2 0 0 9 . ºñÏáõ ·³ÕïÝÇ Ñ³Õáñ¹³·ñáõÃÛáõÝÝ»ñáí ɳÛݳë÷Ûáõé ϳåáõÕáõ ·³ÕïÝÇáõÃÛ³Ý E-áõݳÏáõÃÛ³Ý ïÇñáõÛÃÇ å³ï³Ñ³Ï³Ý Ïá¹³íáñÙ³Ý ·Ý³Ñ³ï³Ï³ÝÁ Ü. ²íß³ñ, º. гñáõÃÛáõÝÛ³Ý ¨ Ø. гñáõÃÛáõÝÛ³Ý ²Ù÷á÷áõÙ Ø”Ýù ѻﳽáïáõÙ »Ýù »ñÏáõ ³ÝÏ³Ë ·³ÕïÝÇ Ñ³Õáñ¹³·ñáõÃÛáõÝÝ»ñáí ÁÝ¹Ñ³ï ³é³Ýó ÑÇßáÕáõÃÛ³Ý É³Ûݳë÷Ûáõé ϳåáõÕáõ ·³ÕïÝÇáõÃÛ³Ý E-áõݳÏáõÃÛ³Ý ïÇñáõÛÃÁ: ³ÕïÝÇáõÃÛ³Ý Ù³Ï³ñ¹³ÏÁ ã³÷íáõÙ ¿ ³ÝáñáßáõÃÛ³Ý ³ñ³·áõÃÛ³Ùµ: γéáõóí³Í ¿ ·³ÕïÝÇáõÃÛ³Ý E-áõݳÏáõÃÛ³Ý ïÇñáõÛÃÇ å³ï³Ñ³Ï³Ý Ïá¹³íáñÙ³Ý ·Ý³Ñ³ï³Ï³ÝÁ: N. Afshar, E. Haroutunian and M. Haroutunian 8 1 Ãðàíèöà ñëó÷àéíîãî êîäèðîâàíèÿ îáëàñòè E-ïðîïóñêíîé ñïîñîáíîñòè ñåêðåòíîñòè øèðîêîâåùàòåëüíîãî êàíàëà ñ äâóìÿ ñåêðåòíûìè ñîîáùåíèÿìè Í.Àôøàð, Å.Àðóòþíÿí è Ì. Àðóòþíÿí Àííîòàöèÿ Ìû èçó÷àåì îáëàñòü ñåêðåòíîé -ïðîïóñêíîé ñïîñîáíîñòè äèñêðåòíîãî øèðîêîâåùàòåëüíîãî êàíàëà áåç ïàìÿòè ñ äâóìÿ íåçàâèñèìûìè ñåêðåòíûìè ñîîñáùåíèÿìè, ïîñûëàåìûìè äâóì àäðåñàòàì. Óðîâåíü ñåêðåòíîñòè èçìåðÿåòñÿ ñêîðîñòüþ íåîïðåäåëåííîñòè. Ìû ñòðîèì ãðàíèöó ñëó÷àéíîãî êîäèðîâàíèÿ äëÿ îáëàñòè ñåêðåòíîé Å-ïðîïóñêíîé ñïîñîáíîñòè øèðîêîâåùàòåëüíîãî êàíàëà ñ äâóìÿ ñåêðåòíûìè ñîîáùåíèÿìè.