scispace - formally typeset
Open AccessJournal ArticleDOI

New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages

Reads0
Chats0
TLDR
In this paper, the capacity region of the MIMO Gaussian wiretap channel with two receivers and three independent messages was investigated, and a matrix characterization of the capacity-equivocation region was provided.
Abstract
This paper presents two new results on multiple-input multiple-output (MIMO) Gaussian broadcast channels with confidential messages. First, the MIMO Gaussian wiretap channel is revisited. A matrix characterization of the capacity-equivocation region is provided, which extends the previous result on the secrecy capacity to the more general imperfect secrecy setting. Next, the MIMO Gaussian broadcast channel with two receivers and three independent messages: a common message intended for both receivers, and two confidential messages each intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other, is considered. A precise characterization of the capacity region is provided, generalizing the previous results which considered only two out of three possible messages.

read more

Citations
More filters
Journal ArticleDOI

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Journal ArticleDOI

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

TL;DR: A comprehensive review of the physical layer security in multiuser wireless networks can be found in this article, where the authors provide an overview of the foundations dating back to Shannon and Wyner on information-theoretic security.
BookDOI

Information Theoretic Security

Carles Padró
TL;DR: This paper shows the first explicit algorithm which can construct strongly k-secure network coding schemes, and it runs in polynomial time for fixed k.
Journal ArticleDOI

Physical Layer Security in Downlink Multi-Antenna Cellular Networks

TL;DR: It is found that unlike isolated cells, if one treats interference as noise, the secrecy rate in a cellular network does not grow monotonically with the transmit power, and the network tends to be in secrecy outage if the transmitter power grows unbounded.
Journal ArticleDOI

Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer

TL;DR: A closed-form expression is obtained for the structure of the artificial noise covariance matrix that guarantees a secrecy rate larger or at least equal to the secrecy capacity of the wiretap channel with no jamming signal.
References
More filters
Book

Elements of information theory

TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Broadcast channels with confidential messages

TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI

The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel

TL;DR: A new notion of an enhanced broadcast channel is introduced and is used jointly with the entropy power inequality, to show that a superposition of Gaussian codes is optimal for the degraded vector broadcast channel and that DPC is ideal for the nondegraded case.