Degraded Multiple-Access Channel with Confidential Messages

被引:0
作者
Dai, Bin [1 ]
Wang, Yongtao [2 ]
机构
[1] Southwest JiaoTong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] China Informat Technol Security Evaluat Ctr, Beijing 100085, Peoples R China
来源
SIXTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS | 2013年
基金
中国国家自然科学基金;
关键词
Confidential messages; capacity-equivocation region; Gaussian MAC; multiple-access channel (MAC); secrecy capacity region; wiretap channel; WIRE-TAP CHANNEL; BROADCAST CHANNELS; SIDE INFORMATION; FEEDBACK; SECRECY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study the degraded multiple-access channel (MAC) with confidential messages, where two users transmit their confidential messages (no common message) to a destination, and each user obtains a degraded version of the output of the MAC. Each user views the other user as a eavesdropper, and wishes to keep its confidential message as secret as possible from the other user. Measuring each users uncertainty about the other users confidential message by equivocation, the inner and outer bounds on the capacity equivocation region for this model have been provided. The result is further explained via the binary and Gaussian examples.
引用
收藏
页码:110 / 113
页数:4
相关论文
共 17 条
[1]  
Ahlswede R, 2006, LECT NOTES COMPUT SC, V4123, P258
[2]  
[Anonymous], 1981, Information Theory: Coding Theorems for Discrete Memoryless Systems
[3]   Wiretap Channel With Secure Rate-Limited Feedback [J].
Ardestanizadeh, Ehsan ;
Franceschetti, Massimo ;
Javidi, Tara ;
Kim, Young-Han .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (12) :5353-5361
[4]   Wiretap channel with side information [J].
Chen, Yanling ;
Vinck, A. J. Han .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) :395-402
[5]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[6]  
Dai B., INFORM THEORETICAL S
[7]  
Dai B., 2012, P 2012 IEEE INT S IN
[8]   Some New Results on the Wiretap Channel with Side Information [J].
Dai, Bin ;
Luo, Yuan .
ENTROPY, 2012, 14 (09) :1671-1702
[9]   GENERAL BROADCAST CHANNELS WITH DEGRADED MESSAGE SETS [J].
KORNER, J ;
MARTON, K .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1977, 23 (01) :60-64
[10]   The Wiretap Channel With Feedback: Encryption Over the Channel [J].
Lai, Lifeng ;
El Gamal, Hesham ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) :5059-5067