2019
DOI: 10.1109/tit.2018.2883299
|View full text |Cite
|
Sign up to set email alerts
|

The Wiretap Channel With Generalized Feedback: Secure Communication and Key Generation

Abstract: It is a well-known fact that feedback does not increase the capacity of point-to-point memoryless channels, however, its effect in secure communications is not fully understood yet. In this paper, an achievable scheme for the wiretap channel with generalized feedback is presented. This scheme, which uses the feedback signal to generate a shared secret key between the legitimate users, encrypts the message to be sent at the bit level. New capacity results for a class of channels are provided, as well as some ne… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 37 publications
(94 reference statements)
0
4
0
Order By: Relevance
“…The results and tools introduced in this work have connections to ones in a previous work of ours [ 28 ], where we studied both the secrecy capacity and the secret key capacity of the wiretap channel with generalized feedback. In [ 28 ], we determined some capacity regions for the problem dealt here as a secondary result of the main problem. It is not surprising that, by being the main focus of the present work, the capacity results shown here are more general than those in [ 28 ].…”
Section: Introductionmentioning
confidence: 84%
See 2 more Smart Citations
“…The results and tools introduced in this work have connections to ones in a previous work of ours [ 28 ], where we studied both the secrecy capacity and the secret key capacity of the wiretap channel with generalized feedback. In [ 28 ], we determined some capacity regions for the problem dealt here as a secondary result of the main problem. It is not surprising that, by being the main focus of the present work, the capacity results shown here are more general than those in [ 28 ].…”
Section: Introductionmentioning
confidence: 84%
“…The outer bound is derived by following similar steps to those in ([ 28 ], Theorem 4) which assumes . It is reproduced here for completeness.…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the perfect output feedback is explicitly used in our achievability proofs, some of our converse results hold for generalized feedback. Furthermore, the fundamental insights gained from our results can be used to tackle generalized feedback scenarios, for which identifying closed-form characterizations becomes challenging; see, e.g., [18]. We next define the strong secrecy-distortion region for the problem of interest.…”
Section: Problem Definitionmentioning
confidence: 99%