4,082 research outputs found
Cooperative Relay Broadcast Channels
The capacity regions are investigated for two relay broadcast channels
(RBCs), where relay links are incorporated into standard two-user broadcast
channels to support user cooperation. In the first channel, the Partially
Cooperative Relay Broadcast Channel, only one user in the system can act as a
relay and transmit to the other user through a relay link. An achievable rate
region is derived based on the relay using the decode-and-forward scheme. An
outer bound on the capacity region is derived and is shown to be tighter than
the cut-set bound. For the special case where the Partially Cooperative RBC is
degraded, the achievable rate region is shown to be tight and provides the
capacity region. Gaussian Partially Cooperative RBCs and Partially Cooperative
RBCs with feedback are further studied. In the second channel model being
studied in the paper, the Fully Cooperative Relay Broadcast Channel, both users
can act as relay nodes and transmit to each other through relay links. This is
a more general model than the Partially Cooperative RBC. All the results for
Partially Cooperative RBCs are correspondingly generalized to the Fully
Cooperative RBCs. It is further shown that the AWGN Fully Cooperative RBC has a
larger achievable rate region than the AWGN Partially Cooperative RBC. The
results illustrate that relaying and user cooperation are powerful techniques
in improving the capacity of broadcast channels.Comment: Submitted to the IEEE Transactions on Information Theory, July 200
Capacity-Equivocation Regions of the DMBCs with Noiseless Feedback
The discrete memoryless broadcast channels (DMBCs) with noiseless feedback are studied. The entire capacity-equivocation regions of two models of the DMBCs with noiseless feedback are obtained. One is the degraded DMBCs with rate-limited feedback; the other is the less and reversely less noisy DMBCs with causal feedback. In both models, two kinds of messages are transmitted. The common message is to be decoded by both the legitimate receiver and the eavesdropper, while the confidential message is only for the legitimate receiver. Our results generalize the secrecy capacity of the degraded wiretap channel with rate-limited feedback (Ardestanizadeh et al., 2009) and the restricted wiretap channel with noiseless feedback (Dai et al., 2012). Furthermore, we use a simpler and more intuitive deduction to get the single-letter characterization of the capacity-equivocation region, instead of relying on the recursive argument which is complex and not intuitive
Degraded Broadcast Channel with Side Information, Confidential Messages and Noiseless Feedback
In this paper, first, we investigate the model of degraded broadcast channel
with side information and confidential messages. This work is from Steinberg's
work on the degraded broadcast channel with causal and noncausal side
information, and Csiszr-K\"{o}rner's work on broadcast channel with
confidential messages. Inner and outer bounds on the capacity-equivocation
regions are provided for the noncausal and causal cases. Superposition coding
and double-binning technique are used in the corresponding achievability
proofs.
Then, we investigate the degraded broadcast channel with side information,
confidential messages and noiseless feedback. The noiseless feedback is from
the non-degraded receiver to the channel encoder. Inner and outer bounds on the
capacity-equivocation region are provided for the noncausal case, and the
capacity-equivocation region is determined for the causal case. Compared with
the model without feedback, we find that the noiseless feedback helps to
enlarge the inner bounds for both causal and noncausal cases. In the
achievability proof of the feedback model, the noiseless feedback is used as a
secret key shared by the non-degraded receiver and the transmitter, and
therefore, the code construction for the feedback model is a combination of
superposition coding, Gel'fand-Pinsker's binning, block Markov coding and
Ahlswede-Cai's secret key on the feedback system.Comment: Part of this paper has been accepted by ISIT2012, and this paper is
submitted to IEEE Transactions on Information Theor
- …