On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback

Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shamay (Shitz) Shlomo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Two-user Gaussian multiple-access wiretap channel models with feedback are investigated. First, we show that the secrecy capacity regions of both the Gaussian multiple-access wiretap channel (GMAC-WT) with feedback and the GMAC-WT with noncausal channel state information at the transmitters (GMAC-WT-NCSIT) and feedback equal the capacity region of the Gaussian multiple-access channel (GMAC) with feedback and without the secrecy constraint and the state corruption. Next, we derive innerand outer bounds on the secrecy capacity region of the GMAC-WT with degraded message set and feedback. Our numerical results show that the perfect secrecy of the private message can be achieved without loss of any reliable transmission rate.

Original languageEnglish
Title of host publicationProceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020
Pages397-401
Number of pages5
ISBN (Electronic)9784885523304
StatePublished - 24 Oct 2020
Event16th International Symposium on Information Theory and its Applications, ISITA 2020 - Kapolei, United States
Duration: 24 Oct 202027 Oct 2020

Publication series

NameProceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020

Conference

Conference16th International Symposium on Information Theory and its Applications, ISITA 2020
Country/TerritoryUnited States
CityKapolei
Period24/10/2027/10/20

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Theoretical Computer Science
  • Computer Science Applications
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback'. Together they form a unique fingerprint.

Cite this