15 research outputs found
Multiple Access Channels with Generalized Feedback and Confidential Messages
This paper considers the problem of secret communication over a multiple
access channel with generalized feedback. Two trusted users send independent
confidential messages to an intended receiver, in the presence of a passive
eavesdropper. In this setting, an active cooperation between two trusted users
is enabled through using channel feedback in order to improve the communication
efficiency. Based on rate-splitting and decode-and-forward strategies,
achievable secrecy rate regions are derived for both discrete memoryless and
Gaussian channels. Results show that channel feedback improves the achievable
secrecy rates.Comment: To appear in the Proceedings of the 2007 IEEE Information Theory
Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 200
On Strong Secrecy for Multiple Access Channel with States and Causal CSI
Strong secrecy communication over a discrete memoryless state-dependent
multiple access channel (SD-MAC) with an external eavesdropper is investigated.
The channel is governed by discrete memoryless and i.i.d. channel states and
the channel state information (CSI) is revealed to the encoders in a causal
manner. An inner bound of the capacity is provided. To establish the inner
bound, we investigate coding schemes incorporating wiretap coding and secret
key agreement between the sender and the legitimate receiver. Two kinds of
block Markov coding schemes are studied. The first one uses backward decoding
and Wyner-Ziv coding and the secret key is constructed from a lossy
reproduction of the CSI. The other one is an extended version of the existing
coding scheme for point-to-point wiretap channels with causal CSI. We further
investigate some capacity-achieving cases for state-dependent multiple access
wiretap channels (SD-MAWCs) with degraded message sets. It turns out that the
two coding schemes are both optimal in these cases.Comment: Accepted for presentation at ISIT202
Secure Communication with Unreliable Entanglement Assistance
Secure communication is considered with unreliable entanglement assistance,
where the adversary may intercept the legitimate receiver's entanglement
resource before communication takes place. The communication setting of
unreliable assistance, without security aspects, was originally motivated by
the extreme photon loss in practical communication systems. The operational
principle is to adapt the transmission rate to the availability of entanglement
assistance, without resorting to feedback and repetition. Here, we require
secrecy as well. An achievable secrecy rate region is derived for general
quantum wiretap channels, and a multi-letter secrecy capacity formula for the
special class of degraded channels
The Multiple-Access Channel with Entangled Transmitters
Communication over a classical multiple-access channel (MAC) with
entanglement resources is considered, whereby two transmitters share
entanglement resources a priori before communication begins. Leditzki et al.
(2020) presented an example of a classical MAC, defined in terms of a pseudo
telepathy game, such that the sum rate with entangled transmitters is strictly
higher than the best achievable sum rate without such resources. Here, we
determine the capacity region for the general MAC with entangled transmitters,
and show that the previous result can be obtained as a special case.
Furthermore, it has long been known that the capacity region of the classical
MAC under a message-average error criterion can be strictly larger than with a
maximal error criterion (Dueck, 1978). We observe that given entanglement
resources, the regions coincide
Secure Joint Communication and Sensing
This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers is treated as an eavesdropper whose state should be estimated but which should remain oblivious to part of the transmitted information. The model abstracts the challenges behind security for joint communication and sensing if one views the channel state as a sensitive attribute, e.g., location. For independent and identically distributed states, perfect output feedback, and when part of the transmitted message should be kept secret, a partial characterization of the secrecy-distortion region is developed. The characterization is exact when the broadcast channel is either physically-degraded or reversely-physically-degraded. The partial characterization is also extended to the situation in which the entire transmitted message should be kept secret. The benefits of a joint approach compared to separation-based secure communication and state-sensing methods are illustrated with a binary joint communication and sensing model
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/