272 research outputs found
The Secrecy Capacity of The Gaussian Wiretap Channel with Rate-Limited Help
The Gaussian wiretap channel with rate-limited help, available at the
legitimate receiver (Rx) or/and transmitter (Tx), is studied under various
channel configurations (degraded, reversely degraded and non-degraded). In the
case of Rx help and all channel configurations, the rate-limited help results
in a secrecy capacity boost equal to the help rate irrespective of whether the
help is secure or not, so that the secrecy of help does not provide any
capacity increase. The secrecy capacity is positive for the reversely-degraded
channel (where the no-help secrecy capacity is zero) and no wiretap coding is
needed to achieve it. More noise at the legitimate receiver can sometimes
result in higher secrecy capacity. The secrecy capacity with Rx help is not
increased even if the helper is aware of the message being transmitted. The
same secrecy capacity boost also holds if non-secure help is available to the
transmitter (encoder), in addition to or instead of the same Rx help, so that,
in the case of the joint Tx/Rx help, one help link can be omitted without
affecting the capacity. If Rx/Tx help links are independent of each other, then
the boost in the secrecy capacity is the sum of help rates and no link can be
omitted without a loss in the capacity. Non-singular correlation of the
receiver and eavesdropper noises does not affect the secrecy capacity and
non-causal help does not bring in any capacity increase over the causal one.Comment: An extended version of the paper presented at the IEEE International
Symposium on Information Theory, Helsinki, Finland, June 26 - July 1, 2022;
submitted to IEEE Trans. Info. Theor
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
- …