Multiple-access channels with confidential messages

被引:221
|
作者
Liang, Yingbin [1 ]
Poor, H. Vincent [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
binary multiple-access channel (MAC); degraded channel; equivocation; Gaussian MAC; inner bound; outer bound; secrecy capacity;
D O I
10.1109/TIT.2007.915978
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A discrete memoryless multiple-access channel (MAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the classical MAC model in that each user also receives channel outputs, and hence may obtain the confidential information sent by the other user from the channel output it receives. However, each user views the other user as a wiretapper or eavesdropper, and wishes to keep its confidential information as secret as possible from the other user. The level of secrecy of the confidential information is measured by the equivocation rate, i.e., the entropy rate of the confidential information conditioned on channel outputs at the wiretapper (the other user). The performance measure is the rate-equivocation tuple that includes the common rate, two private rates, and two equivocation rates as components. The set that includes all achievable rate-equivocation tuples is referred to as the capacity-equivocation region. The case of perfect secrecy is particularly of interest, in which each user's confidential information is perfectly hidden from the other user. The set that includes all achievable rates with perfect secrecy is referred to as the secrecy capacity region. For the MAC with two confidential messages, in which both users have confidential messages for the destination, inner bounds on the capacity-equivocation region, and secrecy capacity region are obtained. It is demonstrated that there is a tradeoff between the two equivocation rates (secrecy levels) achieved for the two confidential messages. For the MAC with one confidential message, in which only one user (user 1) has private (confidential) information for the destination, inner and outer bounds on the capacity-equivocation region are derived. These bounds match partially, and hence the capacity-equivocation region is partially characterized. Furthermore, the outer bound provides a tight converse for the case of perfect secrecy, and hence establishes the secrecy capacity region. A class of degraded MACs with one confidential message is further studied, and the capacity-equivocation region and the secrecy capacity region are established. These results are further explored via two example channels: the binary and Gaussian MACs. For both channels, the capacity-equivocation regions and the secrecy capacity regions are obtained.
引用
收藏
页码:976 / 1002
页数:27
相关论文
共 50 条
  • [1] Fading Cognitive Multiple-Access Channels With Confidential Messages
    Liu, Ruoheng
    Liang, Yingbin
    Poor, H. Vincent
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 371 - +
  • [2] Fading Cognitive Multiple-Access Channels With Confidential Messages
    Liu, Ruoheng
    Liang, Yingbin
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) : 4992 - 5005
  • [3] Three-User Cognitive Multiple-Access Channels with Confidential Messages
    Sonee, Amir
    Hodtani, Ghosheh Abed
    [J]. 2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [4] Degraded Multiple-Access Channel with Confidential Messages
    Dai, Bin
    Wang, Yongtao
    [J]. SIXTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2013, : 110 - 113
  • [5] Generalized multiple access channels with confidential messages
    Liang, Yingbin
    Poor, H. Vincent
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 952 - +
  • [6] On the secrecy capacity region of 3-user cognitive multiple-access channels with confidential messages
    Sonee, Amir
    Hodtani, Ghosheh Abed
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (11):
  • [7] Multiple access channels with generalized feedback and confidential messages
    Tang, Xiaojun
    Liu, Ruoheng
    Spasojevic, Predrag
    Poor, H. Vincent
    [J]. 2007 IEEE INFORMATION THEORY WORKSHOP, VOLS 1 AND 2, 2007, : 608 - +
  • [8] Achievable rates for multiple-access channels with correlated messages
    Pradhan, SS
    Choi, S
    Ramchandran, K
    [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 108 - 108
  • [9] An Achievable Region for the Multiple Access Wiretap Channels with Confidential and Open Messages
    Xu, Hao
    Caire, Giuseppe
    Pan, Cunhua
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 949 - 954
  • [10] Compound Multiple Access Channel with Confidential Messages
    Zivari-Fard, Hassan
    Akhbari, Bahareh
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 1922 - 1927