2010
DOI: 10.1109/jcn.2010.6388487
|View full text |Cite
|
Sign up to set email alerts
|

Secure broadcasting using multiple antennas

Abstract: Abstract:We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 49 publications
(155 reference statements)
0
17
0
Order By: Relevance
“…The capacityequivocation region was originally found for the degraded wiretap channel by Wyner [1], then generalized to the general wiretap channel by Csiszar and Korner [2], and extended to the Gaussian wiretap channel by Leung-YanCheong and Hellman [3]. Multi-user versions of the wiretap channel have been studied recently, e.g., broadcast channels with confidential messages [4], [5], multi-receiver wiretap channels [6]- [8] (see also a survey on extensions of these to MIMO channels [9]), two-user interference channels with confidential messages [4], [10], multiple access wiretap channels [11]- [15], relay eavesdropper channels [16]- [21], compound wiretap channels [22], [23]. Since in most multiuser scenarios it is difficult to obtain the exact secrecy capacity region, achievable secure degrees of freedom (d.o.f.)…”
Section: Introductionmentioning
confidence: 99%
“…The capacityequivocation region was originally found for the degraded wiretap channel by Wyner [1], then generalized to the general wiretap channel by Csiszar and Korner [2], and extended to the Gaussian wiretap channel by Leung-YanCheong and Hellman [3]. Multi-user versions of the wiretap channel have been studied recently, e.g., broadcast channels with confidential messages [4], [5], multi-receiver wiretap channels [6]- [8] (see also a survey on extensions of these to MIMO channels [9]), two-user interference channels with confidential messages [4], [10], multiple access wiretap channels [11]- [15], relay eavesdropper channels [16]- [21], compound wiretap channels [22], [23]. Since in most multiuser scenarios it is difficult to obtain the exact secrecy capacity region, achievable secure degrees of freedom (d.o.f.)…”
Section: Introductionmentioning
confidence: 99%
“…In the downlink, the transmitter transmits confidential messages to the legitimate users while preventing from overhearing of the eavesdroppers. This broadcast channel can be equivalent to a compound wiretap channel which is defined as [3], [23]…”
Section: A Wiretap Channel Modelsmentioning
confidence: 99%
“…In existing literature, there are two kinds of power constraints in the problem of secrecy rate maximization. One is the sum power constraints of all nodes specified by the constraint P (23), and the other is the individual power constraint of each node specified by the constraints 0 ≤ P (23). Noteworthily, beamforming may be more effective for maximizing secrecy rate by strengthening signals on a desired direction and suppressing/eliminating signals on undesired directions.…”
Section: A Secrecy Rate/capacitymentioning
confidence: 99%
“…One particular multi-user extension of the wiretap channel, that is relevant to our work here, is the multi-receiver wiretap channel considered in [3]- [5]. A recent survey on the secure broadcasting problem (including the multi-receiver wiretap channel) can be found in [6].…”
Section: Introductionmentioning
confidence: 99%