TY - GEN
T1 - A Useful Analogy between Wiretap and Gelfand - Pinsker Channels
AU - Goldfeld, Ziv
AU - Permuter, Haim H.
N1 - Publisher Copyright: © 2018 IEEE.
PY - 2018/8/15
Y1 - 2018/8/15
N2 - A framework of analogy between wiretap channels (WTCs) and state-dependent point-to-point channels with noncausal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good (reliable and secure) sequence of wiretap codes is shown to induce a good (reliable) sequence of codes for a corresponding GPC. Consequently, the framework enables exploiting existing results for GPCs to produce converse proofs for their wiretap analogs. The fundamental limits of communication of two analogous wiretap and GP models are characterized by the same rate bounds; the optimization domains may differ. The analogy readily extends to multiuser broadcasting scenarios, encompassing broadcast channels (BCs) with deterministic components, degradation ordering between users, and BCs with cooperative receivers. The analogy is exploited to characterize the secrecy-capacity regions of the semideterministic WTBC (an open problem until this work) and a class of physically degraded WTBC. The derivations are based on known solutions for the corresponding GPBCs.
AB - A framework of analogy between wiretap channels (WTCs) and state-dependent point-to-point channels with noncausal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good (reliable and secure) sequence of wiretap codes is shown to induce a good (reliable) sequence of codes for a corresponding GPC. Consequently, the framework enables exploiting existing results for GPCs to produce converse proofs for their wiretap analogs. The fundamental limits of communication of two analogous wiretap and GP models are characterized by the same rate bounds; the optimization domains may differ. The analogy readily extends to multiuser broadcasting scenarios, encompassing broadcast channels (BCs) with deterministic components, degradation ordering between users, and BCs with cooperative receivers. The analogy is exploited to characterize the secrecy-capacity regions of the semideterministic WTBC (an open problem until this work) and a class of physically degraded WTBC. The derivations are based on known solutions for the corresponding GPBCs.
UR - http://www.scopus.com/inward/record.url?scp=85052462089&partnerID=8YFLogxK
U2 - https://doi.org/10.1109/ISIT.2018.8437676
DO - https://doi.org/10.1109/ISIT.2018.8437676
M3 - Conference contribution
SN - 9781538647806
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 121
EP - 125
BT - 2018 IEEE International Symposium on Information Theory, ISIT 2018
T2 - 2018 IEEE International Symposium on Information Theory, ISIT 2018
Y2 - 17 June 2018 through 22 June 2018
ER -