Multiple Access Wiretap Channel With Partial Rate-Limited Feedback

被引:1
|
作者
Xu, Peng [1 ,2 ]
Chen, Gaojie [3 ]
Yang, Zheng [4 ]
Li, Yong [5 ]
Tomasin, Stefano [6 ,7 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Chongqing Key Lab Mobile Commun Technol, Chongqing 400065, Peoples R China
[3] Univ Surrey, Inst Commun Syst ICS, 5G & 6G Innovat Ctr 5G & 6G, Guildford GU2 7XH, Surrey, England
[4] Fujian Normal Univ, Fujian Prov Engn Technol Res Ctr Photoelect Sensi, Key Lab Optoelec tron Sci & Technol Med, Minist Educ, Fuzhou 350007, Peoples R China
[5] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[6] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
[7] Univ Padua, Dept Math, I-35131 Padua, Italy
基金
英国工程与自然科学研究理事会;
关键词
Multiple access channel; wiretap channel; secrecy capacity region; partial feedback; rate-limited feedback; SECURE COMMUNICATION; CAPACITY REGION; SECRECY; INFORMATION;
D O I
10.1109/TIFS.2024.3359071
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the problem of secure transmission over a two-user discrete memoryless multiple-access wiretap channel with partial rate-limited feedback (MAC-WT-PLF). The receiver can causally and securely transmit feedback to one of the transmitters at a limited rate. Three achievable rate regions and one outer bound on the secrecy capacity are presented based on three proposed coding schemes and the Sato-type bounding approach. The proposed coding schemes show that the feedback can play multiple roles, i.e., encrypting part of messages, enlarging the size of the dummy message, and increasing the correlation between the channel inputs, to enhance the secrecy performance. Of particular interest is identifying the novel role of enlarging the size of the dummy message at one of the transmitters, which enables both transmitters to benefit from the feedback significantly. In addition, the proposed achievable rate regions and outer bound are computed for the Gaussian MAC-WT-PLF, and comparative numerical results are provided under different eavesdropping cases.
引用
收藏
页码:3279 / 3294
页数:16
相关论文
共 50 条
  • [21] Multiple Access Wiretap Channel with Cribbing
    Helal, Noha
    Nosratinia, Aria
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 739 - 743
  • [22] On the Secrecy of Multiple Access Wiretap Channel
    Ekrem, Ersen
    Ulukus, Sennur
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1014 - 1021
  • [23] Inseparability of the Multiple Access Wiretap Channel
    Xie, Jianwei
    Ulukus, Sennur
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 391 - 395
  • [24] The Finite State Multiple-Access Wiretap Channel in the Presence of Delayed Feedback
    Li, Xin
    Dai, Bin
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 74 - 78
  • [25] Capacity of Two-Relay Diamond Networks with Rate-Limited Links to the Relays and a Binary Adder Multiple Access Channel
    Bidokhti, Shirin Saeedi
    Kramer, Gerhard
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1665 - 1669
  • [26] Wiretap Channel with Finite-Rate Feedback
    Liu, Shuiyin
    Hong, Yi
    Viterbo, Emanuele
    2015 22ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2015, : 256 - 259
  • [27] PARTIAL FEEDBACK FOR THE DISCRETE MEMORYLESS MULTIPLE ACCESS CHANNEL
    WILLEMS, FMJ
    VANDERMEULEN, EC
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 287 - 290
  • [28] Multiple-Access Relay Wiretap Channel
    Dai, Bin
    Ma, Zheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1835 - 1849
  • [29] Feedback Capacity of Gaussian Multiple-Access Wiretap Channel with Degraded Message Sets
    Dai, Bin
    Li, Chong
    Liang, Yingbin
    Ma, Zheng
    Shamai , Shlomo
    2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [30] A New Multiple Access Wiretap Channel Model
    Nafea, Mohamed
    Yener, Aylin
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,