2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers 2010
DOI: 10.1109/acssc.2010.5757518
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…In this context, it is also known as the bidirectional broadcast wiretap channel (BBWC). Transmit strategies for the BBWC are also studied in [12,13]. Privacy within the bidirectional relay network is studied in [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…In this context, it is also known as the bidirectional broadcast wiretap channel (BBWC). Transmit strategies for the BBWC are also studied in [12,13]. Privacy within the bidirectional relay network is studied in [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…Since the receiving nodes can use their own messages from the previous phase for decoding, this channel differs from the classical broadcast channel scenario and is therefore called bidirectional broadcast channel (BBC) with common and confidential messages. Note that this differs from the wiretap scenario where the bidirectional communication itself should be secure from eavesdroppers outside the wireless network as for example studied in [16,17]. 1…”
Section: Csiszár and Körner Generalized This To The Broadcast Channelmentioning
confidence: 99%
“…In [65], it is shown that using feedback for encoding is essential in Gaussian fullduplex two-way wiretap channels, while feedback can be ignored in the Gaussian half-duplex two-way relay channel with untrusted relays. More recently, secure transmission strategies have been studied for multiantenna two-way relay channels with network coding in the presence of eavesdroppers [66], [67]. By applying the analog network-coded relaying protocol, the end nodes exchange messages in two time slots.…”
Section: Two-way Relaysmentioning
confidence: 99%