2015
DOI: 10.1109/tcomm.2015.2493063
|View full text |Cite
|
Sign up to set email alerts
|

Degraded Gaussian Diamond–Wiretap Channel

Abstract: In this paper, we present nontrivial upper and lower bounds on the secrecy capacity of the degraded Gaussian diamond-wiretap channel and identify several ranges of channel parameters where these bounds coincide with useful intuitions. Furthermore, we investigate the effect of the presence of an eavesdropper on the capacity. We consider the following two scenarios regarding the availability of randomness: 1) a common randomness is available at the source and the two relays and 2) a randomness is available only … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…In the presence of a secrecy constraint, such converse proof techniques need to be adopted carefully by taking into account the stochastic encoding functions introduced to confuse the eavesdropper. Those works [25], [26] were generalized in [28] for the degraded Gaussian diamond-wiretap channel, in which the secrecy capacity was characterized for several ranges of channel parameters. For non-degraded case, however, the coding scheme used in [28] achieves zero secure d.o.f.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the presence of a secrecy constraint, such converse proof techniques need to be adopted carefully by taking into account the stochastic encoding functions introduced to confuse the eavesdropper. Those works [25], [26] were generalized in [28] for the degraded Gaussian diamond-wiretap channel, in which the secrecy capacity was characterized for several ranges of channel parameters. For non-degraded case, however, the coding scheme used in [28] achieves zero secure d.o.f.…”
Section: Introductionmentioning
confidence: 99%
“…Those works [25], [26] were generalized in [28] for the degraded Gaussian diamond-wiretap channel, in which the secrecy capacity was characterized for several ranges of channel parameters. For non-degraded case, however, the coding scheme used in [28] achieves zero secure d.o.f. and structured codes such as interference alignment and beamforming schemes need to be involved to achieve a positive secure d.o.f.…”
Section: Introductionmentioning
confidence: 99%
“…We require that a message be transmitted reliably to the legitimate receiver, while keeping it confidential from the eavesdropper. We adopt the informationtheoretic notion of confidentiality, widely used in the literature on the wiretap channel [6]- [23]. We thus refer to our setup as the wiretapped diamond-relay channel.…”
mentioning
confidence: 99%