2006
DOI: 10.1109/tit.2006.872968
|View full text |Cite
|
Sign up to set email alerts
|

An achievable region for the Gaussian wiretap channel with side information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
121
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 114 publications
(123 citation statements)
references
References 5 publications
0
121
0
Order By: Relevance
“…Based on Wyner's work, Leung-Yan-Cheong and Hellman studied the Gaussian wiretap channel(GWC) [9], and showed that its secrecy capacity was the difference between the main channel capacity and the overall wiretap channel capacity (the cascade of main channel and wiretap channel). Inspired by the above works, Mitrpant et al [10] studied transmission of confidential messages in the channels with channel state information (CSI). In [10], an inner bound on the capacity-equivocation region was provided for the Gaussian wiretap channel with CSI.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on Wyner's work, Leung-Yan-Cheong and Hellman studied the Gaussian wiretap channel(GWC) [9], and showed that its secrecy capacity was the difference between the main channel capacity and the overall wiretap channel capacity (the cascade of main channel and wiretap channel). Inspired by the above works, Mitrpant et al [10] studied transmission of confidential messages in the channels with channel state information (CSI). In [10], an inner bound on the capacity-equivocation region was provided for the Gaussian wiretap channel with CSI.…”
Section: Introductionmentioning
confidence: 99%
“…Inspired by the above works, Mitrpant et al [10] studied transmission of confidential messages in the channels with channel state information (CSI). In [10], an inner bound on the capacity-equivocation region was provided for the Gaussian wiretap channel with CSI. Furthermore, Chen et al [11] investigated the discrete memoryless wiretap channel with noncausal CSI (see Figure 3), and also provided an inner bound on the capacity-equivocation region.…”
Section: Introductionmentioning
confidence: 99%
“…Note that the coding scheme of [9] is a combination of those in [1,6]. Chen et al [9] generalize Mitrpant et al's work [8] by extending the Gaussian channel to the discrete memoryless channel (DMC), i.e., the result of [8] can be obtained from that of [9]. Recently, N. Merhav [10] studied a variation of the wiretap channel, and obtained the capacity-equivocation region, where both the legitimate receiver and the wiretapper have access to some leaked symbols from the source, but the channels for the wiretapper are more noisy than the legitimate receiver, which shares a secret key with the encoder.…”
Section: Introductionmentioning
confidence: 92%
“…This channel is also called dirty paper channel. Based on the dirty paper channel, C. Mitrpant et al [8] studied the Gaussian wiretap channel with side information, and provided an inner bound on the capacity-equivocation region. Furthermore, Y. Chen et al [9] investigated the discrete memoryless wiretap channel with noncausal side information, and also provided an inner bound on the capacity-equivocation region.…”
Section: Introductionmentioning
confidence: 99%
“…Physical layer security is recolonized as a promising approach to protect the communications confidentiality against eavesdroppers [8]. The method imposes different challenges in terms of key exchange and distribution, especially in the current trend of dynamic network configurations such as wireless sensor networks and ad-hoc networks.…”
Section: Related Workmentioning
confidence: 99%