2019
DOI: 10.1109/tifs.2018.2871779
|View full text |Cite
|
Sign up to set email alerts
|

On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel With a Helper: Achievable Schemes and Upper Bounds

Abstract: We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approach uses signal-scale alignment. We show achievable schemes which are independent of the rationality of the channel gain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…[15] investigated arbitrarily varying MAC with strong secrecy constraint, and provided bounds on its secrecy capacity region. [16]- [18] studied variations of the MAC with secrecy constraint, and proposed bounds on the corresponding secrecy capacity regions. [19] proposed cooperative jamming schemes for the multiple-access wiretap channel (MAC-WT), which enhance the secrecy capacity region.…”
Section: Introductionmentioning
confidence: 99%
“…[15] investigated arbitrarily varying MAC with strong secrecy constraint, and provided bounds on its secrecy capacity region. [16]- [18] studied variations of the MAC with secrecy constraint, and proposed bounds on the corresponding secrecy capacity regions. [19] proposed cooperative jamming schemes for the multiple-access wiretap channel (MAC-WT), which enhance the secrecy capacity region.…”
Section: Introductionmentioning
confidence: 99%