{"title":"Secrecy and Error Exponents of k-Transmitter Multiple Access Wire-tap Channel","authors":"Masahito Hayashi, Yanling Chen","doi":"10.1109/ITW44776.2019.8989099","DOIUrl":null,"url":null,"abstract":"This paper strengthens the known secrecy results for a k-transmitter multiple access channel (MAC) with an external eavesdropper from weak to strong without any rate loss on the achievable region. More specifically, the results are derived under a strong secrecy metric defined by the information leakage to the eavesdropper, instead of the weaker secrecy criteria defined by the information leakage rate or the (average) variation distance. To this end, different approaches are taken to analyze the information leakage and the decoding error probability. Interestingly, both the secrecy and error exponents could be characterized by the (conditional) Rényi mutual information in a concise form. Thus, the region is guaranteed with both information leakage and decoding error probability decreasing exponentially in the code length. Our technique for strong secrecy analysis reflects the resolvability for the k-transmitter MAC; while our error exponent could be regarded as a generalization of Gallager’s error exponent.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Information Theory Workshop (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW44776.2019.8989099","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper strengthens the known secrecy results for a k-transmitter multiple access channel (MAC) with an external eavesdropper from weak to strong without any rate loss on the achievable region. More specifically, the results are derived under a strong secrecy metric defined by the information leakage to the eavesdropper, instead of the weaker secrecy criteria defined by the information leakage rate or the (average) variation distance. To this end, different approaches are taken to analyze the information leakage and the decoding error probability. Interestingly, both the secrecy and error exponents could be characterized by the (conditional) Rényi mutual information in a concise form. Thus, the region is guaranteed with both information leakage and decoding error probability decreasing exponentially in the code length. Our technique for strong secrecy analysis reflects the resolvability for the k-transmitter MAC; while our error exponent could be regarded as a generalization of Gallager’s error exponent.