Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback
Author:
Yuan Haoheng1,
Xie Guangfen1ORCID,
Dai Bin12ORCID
Affiliation:
1. School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China
2. Peng Cheng Laboratory, Shenzhen 518055, China
Abstract
For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted message by the shared key. By secret sharing, any capacity-achieving coding scheme for the AWGN channel without feedback can be secure by itself, which indicates that the capacity of the same model without the secrecy constraint also affords an achievable secrecy rate to the AWGN channel with an eavesdropper and feedback. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? In this paper, we show that the answer to the aforementioned question is no, and propose the optimal feedback coding scheme for the AWGN-MAC-E-CF, which combines an existing linear feedback scheme for the AWGN MAC with feedback and the secret key scheme in the literature. This paper provides a way to find optimal coding schemes for AWGN multi-user channels in the presence of an external eavesdropper and channel feedback.
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China
Natural Science Foundation of Sichuan
central government to guide local scientific and technological development
111 Project
Subject
General Physics and Astronomy
Reference11 articles.
1. The wire-tap channel;Wyner;Bell Syst. Tech. J.,1975
2. The Gaussian wire-tap channel;Hellman;IEEE Trans. Inf. Theory,1978
3. Gamal, A.E., and Kim, Y.-H. (2012). Network Information Theory, Cambridge University Press.
4. Ahlswede, R., and Cai, N. (2006). Identification and Other Probabilistic Models: Rudolf Ahlswede’s Lectures on Information Theory, Springer.
5. Wiretap channel with secure rate-limited feedback;Ardestanizadeh;IEEE Trans. Inf. Theory,2009
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Capacity-Achieving Coding Schemes for Multiple Access Channels;2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC);2024-01-29