2014 IEEE International Symposium on Information Theory 2014
DOI: 10.1109/isit.2014.6874790
|View full text |Cite
|
Sign up to set email alerts
|

Blind wiretap channel with delayed CSIT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
13
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 11 publications
2
13
0
Order By: Relevance
“…An achievable scheme for this model is provided in [6]. It is further shown to be optimal when only linear achievable schemes are admissible, that is, in terms of linear s.d.o.f., in [12]. Theorem 2 strengthens that result by establishing the optimality of Our results illustrate the synergistic benefits of alternating CSIT even with secrecy constraints.…”
Section: Introductionsupporting
confidence: 73%
See 2 more Smart Citations
“…An achievable scheme for this model is provided in [6]. It is further shown to be optimal when only linear achievable schemes are admissible, that is, in terms of linear s.d.o.f., in [12]. Theorem 2 strengthens that result by establishing the optimality of Our results illustrate the synergistic benefits of alternating CSIT even with secrecy constraints.…”
Section: Introductionsupporting
confidence: 73%
“…Beyond these results, partial results are available for the three-user MISO BC with hybrid CSIT in [10], [11]. In addition, [12] considers the MISO wiretap channel with delayed CSIT from the legitimate receiver and no CSIT from the eavesdropper (state DN) and shows that 2 . An achievable scheme to achieve 1 2 sum s.d.o.f.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…for the inputoutput relation stated in (13). To see this, we use [7, Lemma 1], which we state here for completeness.…”
Section: A Linear Secure Degrees Of Freedom Perspectivementioning
confidence: 99%
“…In order to further investigate the optimality of 1 2 (2N − K) as the sum s.d.o.f. for the MAC-WT channel in the regime N ≤ K ≤ 2N , we then restrict ourselves to linear encoding strategies [12,13], where the channel input of each antenna in every time slot is restricted to be a linear combination of some information symbols intended for the legitimate receiver and some artificial noise symbols to provide secrecy at the eavesdropper. We show that under this restriction to linear encoding schemes, the linear sum s.d.o.f.…”
Section: Introductionmentioning
confidence: 99%