Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit

被引:0
|
作者
Yuan, Haoheng [1 ]
Feng, Yanghe [2 ]
Yang, Chuanchuan [3 ,4 ]
Zhuang, Zhuojun [5 ]
Dai, Bin [1 ,4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Natl Univ Def Technol, Coll Syst Engn, Changsha 410073, Peoples R China
[3] Peking Univ, Dept Elect, Beijing 100871, Peoples R China
[4] Peng Cheng Lab, Shenzhen 518055, Peoples R China
[5] Chinese Acad Sci, Innovat Acad Microsatellites, Shanghai 201203, Peoples R China
关键词
Encoding; Receivers; Channel coding; Electronic mail; Gaussian channels; Decoding; Transmitters; Broadcast channel; feedback; Schalkwijk-Kailath scheme; secrecy capacity; SIMO; SISO; wiretap channel; SECRECY CAPACITY; NOISE CHANNELS; CODING SCHEME; STATE; INFORMATION; THEOREM; REGION;
D O I
10.1109/TIFS.2023.3318948
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The two-user Gaussian broadcast wiretap channel with common message and feedback (GBC-WTC-CM-F) is revisited. Traditionally, achievable secrecy rate of this model is achieved by combining Marton's coding scheme for the two-user broadcast channel (BC) and the secret-key based feedback scheme, where both of the two feedback links are used to transmit secret keys shared between the transceivers. Recently, it has been shown that for the Gaussian wiretap channel with feedback, the Schalkwijk-Kailath (SK) feedback scheme achieves its secrecy capacity. Then it is natural to ask: can we do better when applying the SK-type scheme to the GBC-WTC-CM-F? In this paper, we answer this question by proposing two kinds of SK-type schemes. Specifically, first, we propose a hybrid scheme where one feedback link is used to transmit a secret key, and the other one is used for SK-type coding. We show that this hybrid scheme may perform better than the existing one in some cases. Next, we show that Ozarow's extended SK scheme for the two-user Gaussian BC with feedback, where both feedback links are used for SK-type coding, is self-secure (satisfying perfect weak secrecy constraint by itself) and may perform the best. We further show that Ozarow's scheme is in fact a secure finite blocklength coding scheme, and extend it to the static fading SISO and SIMO cases. Finally, the results of this paper are further explained by numerical examples.
引用
收藏
页码:178 / 193
页数:16
相关论文
共 50 条
  • [31] On the Capacity of the Two-User Gaussian Causal Cognitive Interference Channel
    Cardone, Martina
    Tuninetti, Daniela
    Knopp, Raymond
    Salim, Umer
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (05) : 2512 - 2541
  • [32] Improper Gaussian Signaling on the Two-User SISO Interference Channel
    Ho, Zuleita K. M.
    Jorswieck, Eduard
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (09) : 3194 - 3203
  • [33] Adaptive Coding for Information Freshness in a Two-user Broadcast Erasure Channel
    Feng, Songtao
    Yang, Jing
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [34] On the Two-User MISO Broadcast Channel With Alternating CSIT: A Topological Perspective
    Chen, Jinyuan
    Elia, Petros
    Jafar, Syed Ali
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (08) : 4345 - 4366
  • [35] Capacity Characterization of UAV-Enabled Two-User Broadcast Channel
    Wu, Qingqing
    Xu, Jie
    Zhang, Rui
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) : 1955 - 1971
  • [36] Perfect Output Feedback in the Two-User Decentralized Interference Channel
    Perlaza, Samir M.
    Tandon, Ravi
    Poor, H. Vincent
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) : 5441 - 5462
  • [37] Capacity Regions of Two-User Broadcast Erasure Channels with Feedback and Hidden Memory
    Heindlmaier, Michael
    Bidokhti, Shirin Saeedi
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 406 - 410
  • [38] Degrees of Freedom of the Two-User MIMO Broadcast Channel With Private and Common Messages Under Hybrid CSIT Models
    Wang, Yao
    Varanasi, Mahesh K.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (09) : 6004 - 6019
  • [39] Gaussian Broadcast Channel With Feedback
    Bhaskaran, Sibi Raj
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) : 5252 - 5257
  • [40] Feedback Capacity of Gaussian Multiple-Access Wiretap Channel with Degraded Message Sets
    Dai, Bin
    Li, Chong
    Liang, Yingbin
    Ma, Zheng
    Shamai , Shlomo
    [J]. 2020 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,