Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback

Author:

Yuan Haoheng1,Xie Guangfen1ORCID,Dai Bin12ORCID

Affiliation:

1. School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China

2. Peng Cheng Laboratory, Shenzhen 518055, China

Abstract

For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted message by the shared key. By secret sharing, any capacity-achieving coding scheme for the AWGN channel without feedback can be secure by itself, which indicates that the capacity of the same model without the secrecy constraint also affords an achievable secrecy rate to the AWGN channel with an eavesdropper and feedback. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? In this paper, we show that the answer to the aforementioned question is no, and propose the optimal feedback coding scheme for the AWGN-MAC-E-CF, which combines an existing linear feedback scheme for the AWGN MAC with feedback and the secret key scheme in the literature. This paper provides a way to find optimal coding schemes for AWGN multi-user channels in the presence of an external eavesdropper and channel feedback.

Funder

National Key Research and Development Program of China

National Natural Science Foundation of China

Natural Science Foundation of Sichuan

central government to guide local scientific and technological development

111 Project

Publisher

MDPI AG

Subject

General Physics and Astronomy

Reference11 articles.

1. The wire-tap channel;Wyner;Bell Syst. Tech. J.,1975

2. The Gaussian wire-tap channel;Hellman;IEEE Trans. Inf. Theory,1978

3. Gamal, A.E., and Kim, Y.-H. (2012). Network Information Theory, Cambridge University Press.

4. Ahlswede, R., and Cai, N. (2006). Identification and Other Probabilistic Models: Rudolf Ahlswede’s Lectures on Information Theory, Springer.

5. Wiretap channel with secure rate-limited feedback;Ardestanizadeh;IEEE Trans. Inf. Theory,2009

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3