TY - GEN
T1 - From ordinary AWGN codes to optimal MIMO wiretap schemes
AU - Khina, Anatoly
AU - Kochman, Yuval
AU - Khisti, Ashish
N1 - Publisher Copyright: © 2014 IEEE.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - The problem of sending a secret message over the Gaussian multiple-input multiple-output wiretap channel is studied. In a recent work, we have proposed a layered coding scheme where a scalar wiretap code is used in each layer, and successive interference cancellation (SIC) is carried at the legitimate receiver. By a proper rate allocation across the layers, we showed that this scheme satisfies the secrecy constraint at the eavesdropper and achieves the secrecy capacity. However, the existence of the scalar codes was based upon a random coding argument. In this work we take a further step and show how the scheme can be based upon any codes that are good for the ordinary (non-secrecy) additive white Gaussian noise channel. As any stage of the SIC process is equivalent to achieving a corner point of a Gaussian multiple-access channel (MAC) capacity region, the class of codes used needs to be good for the MAC under SIC. Since in the secrecy analysis of our layered scheme, it suffices at each stage to consider a genie-aided eavesdropper that performs SIC, the coding task reduces to guaranteeing secrecy for corner points of induced MACs to the eavesdropper. Structured generation of such codes from ordinary ones is discussed.
AB - The problem of sending a secret message over the Gaussian multiple-input multiple-output wiretap channel is studied. In a recent work, we have proposed a layered coding scheme where a scalar wiretap code is used in each layer, and successive interference cancellation (SIC) is carried at the legitimate receiver. By a proper rate allocation across the layers, we showed that this scheme satisfies the secrecy constraint at the eavesdropper and achieves the secrecy capacity. However, the existence of the scalar codes was based upon a random coding argument. In this work we take a further step and show how the scheme can be based upon any codes that are good for the ordinary (non-secrecy) additive white Gaussian noise channel. As any stage of the SIC process is equivalent to achieving a corner point of a Gaussian multiple-access channel (MAC) capacity region, the class of codes used needs to be good for the MAC under SIC. Since in the secrecy analysis of our layered scheme, it suffices at each stage to consider a genie-aided eavesdropper that performs SIC, the coding task reduces to guaranteeing secrecy for corner points of induced MACs to the eavesdropper. Structured generation of such codes from ordinary ones is discussed.
UR - http://www.scopus.com/inward/record.url?scp=84929324824&partnerID=8YFLogxK
U2 - https://doi.org/10.1109/ITW.2014.6970908
DO - https://doi.org/10.1109/ITW.2014.6970908
M3 - منشور من مؤتمر
T3 - 2014 IEEE Information Theory Workshop, ITW 2014
SP - 631
EP - 635
BT - 2014 IEEE Information Theory Workshop, ITW 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE Information Theory Workshop, ITW 2014
Y2 - 2 November 2014 through 5 November 2014
ER -