Feedback capacity of Gaussian multiple-access wiretap channel with degraded message sets

Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Schalkwijk-Kailath (SK) feedback scheme is a capacity-achieving coding scheme for the point-to-point white Gaussian channel with feedback. Recently, it has been shown that the SK scheme, which is not designed with consideration of secrecy, already achieves perfect weak secrecy by itself, i.e., the secrecy capacity of the Gaussian wiretap channel with feedback equals the capacity of the same model without secrecy constraint. In this paper, we propose a capacity-achieving SK type feedback scheme for the two-user Gaussian multiple-access channel with degraded message sets (GMAC-DMS). Similarly to the inherent secrecy nature of the classical SK scheme, we show that the proposed scheme is also secure by itself, which indicates that the feedback secrecy capacity of the two-user Gaussian multiple-access wiretap channel with degraded message sets (GMAC-WT-DMS) equals the capacity of the same model without secrecy constraint.

Original languageEnglish
Title of host publication2020 IEEE Information Theory Workshop, ITW 2020
ISBN (Electronic)9781728159621
DOIs
StatePublished - 11 Apr 2021
Event2020 IEEE Information Theory Workshop, ITW 2020 - Virtual, Riva del Garda, Italy
Duration: 11 Apr 202115 Apr 2021

Publication series

Name2020 IEEE Information Theory Workshop, ITW 2020

Conference

Conference2020 IEEE Information Theory Workshop, ITW 2020
Country/TerritoryItaly
CityVirtual, Riva del Garda
Period11/04/2115/04/21

Keywords

  • Feedback
  • Gaussian multiple-access wiretap channel
  • Secrecy capacity region

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Information Systems
  • Signal Processing
  • Software
  • Theoretical Computer Science

Fingerprint

Dive into the research topics of 'Feedback capacity of Gaussian multiple-access wiretap channel with degraded message sets'. Together they form a unique fingerprint.

Cite this