On the secrecy of multiple access wiretap channel

E. Ekrem, S. Ulukus
{"title":"On the secrecy of multiple access wiretap channel","authors":"E. Ekrem, S. Ulukus","doi":"10.1109/ALLERTON.2008.4797670","DOIUrl":null,"url":null,"abstract":"We develop an outer bound for the secrecy capacity region of a class of multiple access wiretap channels (MAC-WT). In this class, which we call the weak eavesdropper class, each user's link to the legitimate receiver is stronger than its link to the eavesdropper. Our outer bound partially matches the achievable region in an n-letter form. In addition, a looser version of our outer bound provides close approximations to the capacity region of the Gaussian MAC-WT channel. In particular, we prove that our outer bound is within 0.5 bits/channel use of the achievable rates along the individual rates for all weak eavesdropper Gaussian MAC-WT, and within 0.5 bits/channel use in all directions for certain weak eavesdropper Gaussian MAC-WT channels.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"99","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ALLERTON.2008.4797670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 99

Abstract

We develop an outer bound for the secrecy capacity region of a class of multiple access wiretap channels (MAC-WT). In this class, which we call the weak eavesdropper class, each user's link to the legitimate receiver is stronger than its link to the eavesdropper. Our outer bound partially matches the achievable region in an n-letter form. In addition, a looser version of our outer bound provides close approximations to the capacity region of the Gaussian MAC-WT channel. In particular, we prove that our outer bound is within 0.5 bits/channel use of the achievable rates along the individual rates for all weak eavesdropper Gaussian MAC-WT, and within 0.5 bits/channel use in all directions for certain weak eavesdropper Gaussian MAC-WT channels.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多址窃听信道的保密性研究
本文给出了一类多址窃听信道(MAC-WT)保密容量区域的外边界。在这个类中,我们称之为弱窃听者类,每个用户到合法接收者的链接要比它到窃听者的链接强。我们的外界以n字母的形式部分匹配可实现区域。此外,我们的外界的一个更宽松的版本提供了高斯MAC-WT信道的容量区域的近似。特别地,我们证明了我们的外界是在0.5比特/信道内使用所有弱窃听高斯MAC-WT的单个速率的可实现速率,以及在所有方向上使用某些弱窃听高斯MAC-WT的0.5比特/信道。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Learning sparse doubly-selective channels Ergodic two-user interference channels: Is separability optimal? Weight distribution of codes on hypergraphs Compound multiple access channels with conferencing decoders Transmission techniques for relay-interference networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1