Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets

Bin Dai, Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai

Research output: Contribution to journalArticlepeer-review

Abstract

It has been shown that the SK scheme, which was proposed by Schalkwijk and Kailath, is a self-secure capacity-achieving (SSCA) feedback scheme for the Gaussian wiretap channel, i.e., the SK scheme not only achieves the feedback capacity of the Gaussian channel, but also is secure by itself and achieves the feedback secrecy capacity of the Gaussian wiretap channel. For the multi-user wiretap channels, very recently, it has been shown that Ozarow's capacity-achieving feedback scheme for the two-user Gaussian multiple-access channel (GMAC) is the SSCA feedback scheme for the two-user Gaussian multiple-access wiretap channel (GMAC-WT). In this paper, first, we propose a SSCA feedback scheme for the two-user GMAC-WT with degraded message sets (GMAC-WT-DMS). Next, we extend the above scheme to the two-user GMAC-WT-DMS with noncausal channel state information at the transmitters (NCSIT), and show that the extended scheme is also a SSCA feedback scheme. Finally, we derive outer bounds on the secrecy capacity regions of the two-user GMAC-WT-DMS with or without NCSIT, and numerical results show the rate gains by the feedback.

Original languageEnglish
Pages (from-to)1583-1596
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume17
DOIs
StatePublished - 2022

Keywords

  • Capacity planning
  • Channel capacity
  • Channel state information
  • Decoding
  • Degraded message sets
  • Encoding
  • Gaussian channels
  • Gaussian multiple-access channel
  • Receivers
  • feedback
  • noncausal channel state information
  • secrecy capacity region
  • wiretap channel

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Self-Secure Capacity-Achieving Feedback Schemes of Gaussian Multiple-Access Wiretap Channels With Degraded Message Sets'. Together they form a unique fingerprint.

Cite this