2015
DOI: 10.1109/tit.2015.2463279
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels

Abstract: Abstract-This work investigates the secrecy capacity of the Wiretap Broadcast Channel (WBC) with an external eavesdropper where a source wishes to communicate two private messages over a Broadcast Channel (BC) while keeping them secret from the eavesdropper. We derive a non-trivial outer bound on the secrecy capacity region of this channel which, in absence of security constraints, reduces to the best known outer bound to the capacity of the standard BC. An inner bound is also derived which follows the behavio… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(26 citation statements)
references
References 24 publications
0
26
0
Order By: Relevance
“…Based on the new analytic expressions for the PDF and CDF of the Fisher-Snedecor F fading distribution given in (6) and 7, we analyze the average secrecy capacity, the secrecy outage probability, and the strictly-positive secrecy capacity.…”
Section: Phy Layer Security Over F Fading Channelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on the new analytic expressions for the PDF and CDF of the Fisher-Snedecor F fading distribution given in (6) and 7, we analyze the average secrecy capacity, the secrecy outage probability, and the strictly-positive secrecy capacity.…”
Section: Phy Layer Security Over F Fading Channelsmentioning
confidence: 99%
“…III, we quantify the asymptotic performance when γ D → ∞, which can be also viewed as the scenario where the destination D is located close to the source S. As such, the asymptotic behavior can be derived based on the behavior of the PDF of γ k around the origin. Thus, the PDF, given in (5) or (6), and the CDF, given in 7, at high SNR regime can be rewritten as…”
Section: Asymptotic Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…(b) An analogous GPBC is constructed by replacing the eavesdropper's observation with a state sequence Z ∼ q n Z , non-causally revealing Z to the encoder and setting the state-dependent BC's transition kernel to p Y1,Y2|X,Z , i.e., the conditional marginal distribution of the WTBC's law p Y1,Y2,Z|X . is due to [13], where the regions for the SD-WTBC and the PD-WTBC were derived under the weak-secrecy metric, while assuming that the stochastic receiver is less noisy than the eavesdropper. The coding schemes therein does not rely on this less-noisy property; the converse proofs, however, do.…”
Section: A the Analogy And Its Implicationsmentioning
confidence: 99%
“…Later on, Wyner considered a noisy scenario called wiretap channel [7], where the transmitter and the receiver are allowed to communicate through a discrete memoryless channel (DMC) with an eavesdropper at the receiver. The studies in this direction have been extended to broadcast channels (i.e., multiple receivers scenarios) [8]- [11].…”
Section: Introductionmentioning
confidence: 99%