New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages
Reads0
Chats0
TLDR
In this paper, the capacity region of the MIMO Gaussian wiretap channel with two receivers and three independent messages was investigated, and a matrix characterization of the capacity-equivocation region was provided.Abstract:
This paper presents two new results on multiple-input multiple-output (MIMO) Gaussian broadcast channels with confidential messages. First, the MIMO Gaussian wiretap channel is revisited. A matrix characterization of the capacity-equivocation region is provided, which extends the previous result on the secrecy capacity to the more general imperfect secrecy setting. Next, the MIMO Gaussian broadcast channel with two receivers and three independent messages: a common message intended for both receivers, and two confidential messages each intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other, is considered. A precise characterization of the capacity region is provided, generalizing the previous results which considered only two out of three possible messages.read more
Citations
More filters
Journal ArticleDOI
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Journal ArticleDOI
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
TL;DR: A comprehensive review of the physical layer security in multiuser wireless networks can be found in this article, where the authors provide an overview of the foundations dating back to Shannon and Wyner on information-theoretic security.
BookDOI
Information Theoretic Security
TL;DR: This paper shows the first explicit algorithm which can construct strongly k-secure network coding schemes, and it runs in polynomial time for fixed k.
Journal ArticleDOI
Physical Layer Security in Downlink Multi-Antenna Cellular Networks
TL;DR: It is found that unlike isolated cells, if one treats interference as noise, the secrecy rate in a cellular network does not grow monotonically with the transmit power, and the network tends to be in secrecy outage if the transmitter power grows unbounded.
Journal ArticleDOI
Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer
TL;DR: A closed-form expression is obtained for the structure of the artificial noise covariance matrix that guarantees a secrecy rate larger or at least equal to the secrecy capacity of the wiretap channel with no jamming signal.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI
Broadcast channels with confidential messages
Imre Csiszár,János Körner +1 more
TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Information Theory: Coding theorems for discrete memoryless systems, Second Edition
Janos Korner,Imre Csiszár +1 more
Journal ArticleDOI
The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel
TL;DR: A new notion of an enhanced broadcast channel is introduced and is used jointly with the entropy power inequality, to show that a superposition of Gaussian codes is optimal for the degraded vector broadcast channel and that DPC is ideal for the nondegraded case.