8 research outputs found
MAC Resolvability: First And Second Order Results
Building upon previous work on the relation between secrecy and channel
resolvability, we revisit a secrecy proof for the multiple-access channel from
the perspective of resolvability. We then refine the approach in order to
obtain some novel results on the second-order achievable rates.Comment: Slightly extended version of the paper accepted at the 4th Workshop
on Physical-Layer Methods for Wireless Security during IEEE CNS 2017. v2:
Fixed typos and extended literature section in accordance with reviewers'
recommendation
Resolvability on Continuous Alphabets
We characterize the resolvability region for a large class of point-to-point
channels with continuous alphabets. In our direct result, we prove not only the
existence of good resolvability codebooks, but adapt an approach based on the
Chernoff-Hoeffding bound to the continuous case showing that the probability of
drawing an unsuitable codebook is doubly exponentially small. For the converse
part, we show that our previous elementary result carries over to the
continuous case easily under some mild continuity assumption.Comment: v2: Corrected inaccuracies in proof of direct part. Statement of
Theorem 3 slightly adapted; other results unchanged v3: Extended version of
camera ready version submitted to ISIT 201
Strongly Secure Communications Over the Two-Way Wiretap Channel
We consider the problem of secure communications over the two-way wiretap
channel under a strong secrecy criterion. We improve existing results by
developing an achievable region based on strategies that exploit both the
interference at the eavesdropper's terminal and cooperation between legitimate
users. We leverage the notion of channel resolvability for the multiple-access
channel to analyze cooperative jamming and we show that the artificial noise
created by cooperative jamming induces a source of common randomness that can
be used for secret-key agreement. We illustrate the gain provided by this
coding technique in the case of the Gaussian two-way wiretap channel, and we
show significant improvements for some channel configurations.Comment: 11 pages, 7 figures, submitted to IEEE Transactions on Information
Forensics and Security, Special Issue: "Using the Physical Layer for Securing
the Next Generation of Communication Systems
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost Constraints
This paper studies the secrecy results for the two-way wiretap channel
(TW-WC) with an external eavesdropper under a strong secrecy metric. Employing
non-adaptive coding, we analyze the information leakage and the decoding error
probability, and derive inner bounds on the secrecy capacity regions for the
TW-WC under strong joint and individual secrecy constraints. For the TW-WC
without cost constraint, both the secrecy and error exponents could be
characterized by the conditional R\'enyi mutual information in a concise and
compact form. And, some special cases secrecy capacity region and sum-rate
capacity results are established, demonstrating that adaption is useless in
some cases or the maximum sum-rate that could be achieved by non-adaptive
coding. For the TW-WC with cost constraint, we consider the peak cost
constraint and extend our secrecy results by using the constant composition
codes. Accordingly, we characterize both the secrecy and error exponents by a
modification of R\'enyi mutual information, which yields inner bounds on the
secrecy capacity regions for the general discrete memoryless TW-WC with cost
constraint. Our method works even when a pre-noisy processing is employed based
on a conditional distribution in the encoder and can be easily extended to
other multi-user communication scenarios