772 research outputs found

    On the inner and outer bounds for 2-receiver discrete memoryless broadcast channels

    Full text link
    We study the best known general inner bound[MAR '79] and outer bound[N-EG'07] for the capacity region of the two user discrete memory less channel. We prove that a seemingly stronger outer bound is identical to a weaker form of the outer bound that was also presented in [N-EG'07]. We are able to further express the best outer bound in a form that is computable, i.e. there are bounds on the cardinalities of the auxiliary random variables. The inner and outer bounds coincide for all channels for which the capacity region is known and it is not known whether the regions described by these bounds are same or different. We present a channel, where assuming a certain conjecture backed by simulations and partial theoretical results, one can show that the bounds are different.Comment: 4 pages, 2 figures, ITA Workshop San Diego 200

    Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions

    Full text link
    We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers with information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, the two bound bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.Comment: to appear Special Issue of IEEE Transactions on Information Theory on Information Theoretic Securit

    Multi-receiver Wiretap Channel with Public and Confidential Messages

    Full text link
    We study the multi-receiver wiretap channel with public and confidential messages. In this channel, there is a transmitter that wishes to communicate with two legitimate users in the presence of an external eavesdropper. The transmitter sends a pair of public and confidential messages to each legitimate user. While there are no secrecy constraints on the public messages, confidential messages need to be transmitted in perfect secrecy. We study the discrete memoryless multi-receiver wiretap channel as well as its Gaussian multi-input multi-output (MIMO) instance. First, we consider the degraded discrete memoryless channel, and obtain an inner bound for the capacity region by using an achievable scheme that uses superposition coding and binning. Next, we obtain an outer bound, and show that this outer bound partially matches the inner bound, providing a partial characterization for the capacity region of the degraded channel model. Second, we obtain an inner bound for the general, not necessarily degraded, discrete memoryless channel by using Marton's inner bound, superposition coding, rate-splitting and binning. Third, we consider the degraded Gaussian MIMO channel, and show that, to evaluate both the inner and outer bounds, considering only jointly Gaussian auxiliary random variables and channel input is sufficient. Since the inner and outer bounds partially match, these sufficiency results provide a partial characterization of the capacity region of the degraded Gaussian MIMO channel. Finally, we provide an inner bound for the capacity region of the general, not necessarily degraded, Gaussian MIMO multi-receiver wiretap channel.Comment: Submitted to IEEE Transactions on Information Theory, June 201

    Capacity Bounds and a Certain Capacity Region for Special Three-Receiver Broadcast Channels with Side Information

    Full text link
    The fact that the results for 2-receiver broadcast channels (BCs) are not generalized to the 3-receiver ones is of information theoretical importance. In this paper we study two classes of discrete memoryless BCs with non-causal side information (SI), i.e. multilevel BC (MBC) and 3-receiver less noisy BC. First, we obtain an achievable rate region and a capacity outer bound for the MBC. Second, we prove a special capacity region for the 3-receiver less noisy BC. Third, the obtained special capacity region for the 3-receiver less noisy BC is extended to continuous alphabet fading Gaussian version. It is worth mentioning that the previous works are special cases of our works.Comment: 24 pages, 2 figures, Submitted to IET Communications Journal for possible publicatio

    Multiple-Access Relay Wiretap Channel

    Full text link
    In this paper, we investigate the effects of an additional trusted relay node on the secrecy of multiple-access wiretap channel (MAC-WT) by considering the model of multiple-access relay wiretap channel (MARC-WT). More specifically, first, we investigate the discrete memoryless MARC-WT. Three inner bounds (with respect to decode-forward (DF), noise-forward (NF) and compress-forward (CF) strategies) on the secrecy capacity region are provided. Second, we investigate the degraded discrete memoryless MARC-WT, and present an outer bound on the secrecy capacity region of this degraded model. Finally, we investigate the Gaussian MARC-WT, and find that the NF and CF strategies help to enhance Tekin-Yener's achievable secrecy rate region of Gaussian MAC-WT. Moreover, we find that if the noise variance of the transmitters-relay channel is smaller than that of the transmitters-receiver channel, the DF strategy may also enhance Tekin-Yener's achievable secrecy rate region of Gaussian MAC-WT, and it may perform even better than the NF and CF strategies.Comment: Accepted by IEEE Transactions on Information Forensics & Security. arXiv admin note: text overlap with arXiv:1312.6784; text overlap with arXiv:cs/0612044 by other author

    Distortion Bounds for Source Broadcast Problems

    Full text link
    This paper investigates the joint source-channel coding problem of sending a memoryless source over a memoryless broadcast channel. An inner bound and several outer bounds on the admissible distortion region are derived, which respectively generalize and unify several existing bounds. As a consequence, we also obtain an inner bound and an outer bound for the degraded broadcast channel case. When specialized to the Gaussian or binary source broadcast, the inner bound and outer bound not only recover the best known inner bound and outer bound in the literature, but also generate some new results. Besides, we also extend the inner bound and outer bounds to the Wyner-Ziv source broadcast problem, i.e., source broadcast with side information available at decoders. Some new bounds are obtained when specialized to the Wyner-Ziv Gaussian and Wyner-Ziv binary cases.Comment: Accepted by IEEE Transactions on Information Theor

    Bounds and Capacity Theorems for Cognitive Interference Channels with State

    Full text link
    A class of cognitive interference channel with state is investigated, in which two transmitters (transmitters 1 and 2) communicate with two receivers (receivers 1 and 2) over an interference channel. The two transmitters jointly transmit a common message to the two receivers, and transmitter 2 also sends a separate message to receiver 2. The channel is corrupted by an independent and identically distributed (i.i.d.) state sequence. The scenario in which the state sequence is noncausally known only at transmitter 2 is first studied. For the discrete memoryless channel and its degraded version, inner and outer bounds on the capacity region are obtained. The capacity region is characterized for the degraded semideterministic channel and channels that satisfy a less noisy condition. The Gaussian channels are further studied, which are partitioned into two cases based on how the interference compares with the signal at receiver 1. For each case, inner and outer bounds on the capacity region are derived, and partial boundary of the capacity region is characterized. The full capacity region is characterized for channels that satisfy certain conditions. The second scenario in which the state sequence is noncausally known at both transmitter 2 and receiver 2 is further studied. The capacity region is obtained for both the discrete memoryless and Gaussian channels. It is also shown that this capacity is achieved by certain Gaussian channels with state noncausally known only at transmitter 2.Comment: Submitted to the IEEE Transactions on Information Theor

    On the Capacity of the Cognitive Interference Channel with a Common Cognitive Message

    Full text link
    In this paper the cognitive interference channel with a common message, a variation of the classical cognitive interference channel in which the cognitive message is decoded at both receivers, is studied. For this channel model new outer and inner bounds are developed as well as new capacity results for both the discrete memoryless and the Gaussian case. The outer bounds are derived using bounding techniques originally developed by Sato for the classical interference channel and Nair and El Gamal for the broadcast channel. A general inner bound is obtained combining rate-splitting, superposition coding and binning. Inner and outer bounds are shown to coincide in the "very strong interference" and the "primary decodes cognitive" regimes. The first regime consists of channels in which there is no loss of optimality in having both receivers decode both messages while in the latter regime interference pre-cancellation at the cognitive receiver achieves capacity. Capacity for the Gaussian channel is shown to within a constant additive gap and a constant multiplicative factor.Comment: submitted to Transactions on Emerging Telecommunications Technologies (ETT). arXiv admin note: substantial text overlap with arXiv:1202.097

    Multiple Access Channel with Common Message and Secrecy constraint

    Full text link
    In this paper, we study the problem of secret communication over a multiple-access channel with a common message. Here, we assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. We call this setting as Multiple-Access Wiretap Channel with Common message (MAWC-CM). For this setting, we derive general inner and outer bounds on the secrecy capacity region for the discrete memoryless case and show that these bounds meet each other for a special case called the switch channel. As well, for a Gaussian version of MAWC-CM, we derive inner and outer bounds on the secrecy capacity region. Providing numerical results for the Gaussian case, we illustrate the comparison between the derived achievable rate region and the outer bound for the considered model and the capacity region of compound multiple access channel.Comment: 11 pages, 7 figures, Accepted in IET Communication

    Degrees of Freedom of the Broadcast Channel with Hybrid CSI at Transmitter and Receivers

    Full text link
    In general, the different links of a broadcast channel may experience different fading dynamics and, potentially, unequal or hybrid channel state information (CSI) conditions. The faster the fading and the shorter the fading block length, the more often the link needs to be trained and estimated at the receiver, and the more likely that CSI is stale or unavailable at the transmitter. Disparity of link fading dynamics in the presence of CSI limitations can be modeled by a multi-user broadcast channel with both non-identical link fading block lengths as well as dissimilar link CSIR/CSIT conditions. This paper investigates a MISO broadcast channel where some receivers experience longer coherence intervals (static receivers) and have CSIR, while some other receivers experience shorter coherence intervals (dynamic receivers) and do not enjoy free CSIR. We consider a variety of CSIT conditions for the above mentioned model, including no CSIT, delayed CSIT, or hybrid CSIT. To investigate the degrees of freedom region, we employ interference alignment and beamforming along with a product superposition that allows simultaneous but non-contaminating transmission of pilots and data to different receivers. Outer bounds employ the extremal entropy inequality as well as a bounding of the performance of a discrete memoryless multiuser multilevel broadcast channel. For several cases, inner and outer bounds are established that either partially meet, or the gap diminishes with increasing coherence times.Comment: 36 pages, 8 figures, submitted to IEEE Transactions on Information Theor
    • …
    corecore