Secret Writing on Dirty Paper: A Deterministic View

被引:24
作者
El-Halabi, Mustafa [1 ]
Liu, Tie [1 ]
Georghiades, Costas N. [1 ]
Shamai , Shlomo [2 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
[2] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
基金
美国国家科学基金会; 以色列科学基金会;
关键词
Dirty-paper coding; information-theoretic security; linear deterministic model; side information; wiretap channel; CHANNEL CAPACITY; SIDE INFORMATION; WIRETAP CHANNEL;
D O I
10.1109/TIT.2012.2190820
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been a lot of success in using the deterministic approach to provide approximate characterization of Gaussian network capacity. In this paper, we take a deterministic view and revisit the problem of wiretap channel with side information. A precise characterization of the secrecy capacity is obtained for a linear deterministic model, which naturally suggests a coding scheme which we show to achieve the secrecy capacity of the degraded Gaussian model (dubbed as "secret writing on dirty paper") to within half a bit.
引用
收藏
页码:3419 / 3429
页数:11
相关论文
共 15 条
[1]   Wireless Network Information Flow: A Deterministic Approach [J].
Avestimehr, A. Salman ;
Diggavi, Suhas N. ;
Tse, David N. C. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (04) :1872-1905
[2]   Wiretap channel with side information [J].
Chen, Yanling ;
Vinck, A. J. Han .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) :395-402
[3]   WRITING ON DIRTY PAPER [J].
COSTA, MHM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) :439-441
[4]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[5]   Gaussian Interference Channel Capacity to Within One Bit [J].
Etkin, Raul H. ;
Tse, David N. C. ;
Wang, Hua .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (12) :5534-5562
[6]  
Gel'fand S. I., 1980, Problems of Control and Information Theory, V9, P19
[7]  
Grubb J.W., 2008, Preventative Measures for Spontaneous Combustion in Underground Coal Mines, P1
[8]   Secret-Key Agreement With Channel State Information at the Transmitter [J].
Khisti, Ashish ;
Diggavi, Suhas N. ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :672-681
[9]  
Khosravi-FarsaniF R. M., CAPACITY BO IN PRESS
[10]   An achievable region for the Gaussian wiretap channel with side information [J].
Mitrpant, C ;
Vinck, AJH ;
Luo, Y .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (05) :2181-2190