2009 43rd Annual Conference on Information Sciences and Systems 2009
DOI: 10.1109/ciss.2009.5054708
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy capacity region of Gaussian broadcast channel

Abstract: 1 Abstract-In this paper, we first consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-taper also receives the transmitted signal. We assume that the signals are transmitted over additive white Gaussian noise channels. We characterize the secrecy capacity region of this channel. Our achievable coding scheme is based on superposition coding and the random binning. We refer to this scheme as Secret Superposition Coding. The converse pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

2
28
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(30 citation statements)
references
References 7 publications
2
28
0
Order By: Relevance
“…where (26) follows from (19) and (21), and (27) follows from the fact that the random variables satisfy (6).…”
Section: R 1 :Si(u;y 1iv)-i(u;y 2iv) (32) R 2 :S H(y 2iv) + Min(i(v; mentioning
confidence: 99%
“…where (26) follows from (19) and (21), and (27) follows from the fact that the random variables satisfy (6).…”
Section: R 1 :Si(u;y 1iv)-i(u;y 2iv) (32) R 2 :S H(y 2iv) + Min(i(v; mentioning
confidence: 99%
“…In recent times that has been a significant interest in applying this model to wireless communication systems. Some recent works include secure communications over fading channels [2]- [4], multi-antenna wiretap channels [5]- [13] and several multiuser channels.…”
Section: Introductionmentioning
confidence: 99%
“…In addition we provide lower bounds based on time-sharing and noise transmission strategies and show that in some special cases these bounds can be further improved using signal alignment and multilevel coding strategies. While our analysis is restricted to the MISO wiretap channel, we expect techniques developed in deriving upper and lower bounds to be applicable to related problems such as the compund extension of the MIMO wiretap channel, the two receiver broadcast channel with mutually confidential messages [9] and the multi-receiver broadcast channel with an external wiretapper [12], [13]. We note that recently signal and interference alignment schemes have been used in the wiretap channel literature in e.g.…”
Section: Introductionmentioning
confidence: 99%
“…As we will show in the sequel, any Gaussian multi-receiver wiretap channel can be regarded as a degraded multi-receiver wiretap channel, whose secrecy capacity region is known in a single-letter form [4]- [6]. This single-letter expression involves auxiliary random variables which need to be identified to establish the secrecy capacity region.…”
Section: Introductionmentioning
confidence: 99%