2012 IEEE International Symposium on Information Theory Proceedings 2012
DOI: 10.1109/isit.2012.6284216
|View full text |Cite
|
Sign up to set email alerts
|

Three-receiver broadcast channels with side information

Abstract: Abstract-Three-Receiver broadcast channels (BC) are of interest due to their information-theoretic differences with tworeceiver one. In this paper, we derive achievable rate regions for two classes of 3-receiver BC with side information (SI), i.e. Multilevel BC (MBC) and 3-receiver less noisy BC, using a combination of superposition coding, Gelf'and-Pinsker binning scheme and Nair-El Gamal indirect decoding. Our rate region for MBC subsumes Steinberg's rate region for 2-receiver degraded BC with SI as its spec… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 30 publications
(52 reference statements)
0
5
0
Order By: Relevance
“…Consider ( M ) to be any random variable such that Mfalse→Xn,thinmathspaceSnfalse→Yn,thinmathspaceZnforms a Markov chain, then we have right leftthickmathspace.5emIYi1;Yi|M,SnIZi1;Yi|M,SnIYi1;Zi|M,SnIZi1;Zi|M,Snwhere 1 ≤ i ≤ n . Proof of the lemma is identical to what mentioned in [36] and is ignored. Now we start to prove the converse part.…”
Section: 3‐receiver Less Noisy Bc With Non‐causal Simentioning
confidence: 95%
“…Consider ( M ) to be any random variable such that Mfalse→Xn,thinmathspaceSnfalse→Yn,thinmathspaceZnforms a Markov chain, then we have right leftthickmathspace.5emIYi1;Yi|M,SnIZi1;Yi|M,SnIYi1;Zi|M,SnIZi1;Zi|M,Snwhere 1 ≤ i ≤ n . Proof of the lemma is identical to what mentioned in [36] and is ignored. Now we start to prove the converse part.…”
Section: 3‐receiver Less Noisy Bc With Non‐causal Simentioning
confidence: 95%
“…In that case, a confidential message can be encoded such that it can be reliably decoded at its intended destination while revealing almost no information to the eavesdropper. On this basis, physical (PHY) layer security derived from the information-theoretic perspective has attracted much attention recently as a promising approach for protecting against eavesdropping, without significantly increasing computational complexity [4][5][6][7][8]. The basic idea is to exploit the PHY characteristics of the wireless channels in order to mitigate eavesdropping attacks.…”
Section: A Backgroundmentioning
confidence: 99%
“…Gelf'and and Pinsker [6] found the capacity of a single-user channel with side information non-causally available at the encoders. State-dependent multiuser settings have been studied in [7], [8], [9], [10], and [11].…”
Section: Introductionmentioning
confidence: 99%