2015
DOI: 10.1109/tit.2015.2412114
|View full text |Cite
|
Sign up to set email alerts
|

Secure Compute-and-Forward in a Bidirectional Relay

Abstract: We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node. In the compute-and-forward strategy, the relay computes a function of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian multiple access (MAC) channel, and the computed function value is forwarded to the user nodes in an ensuing broadcast phase. In this paper, we study the problem under an a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
63
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(63 citation statements)
references
References 39 publications
0
63
0
Order By: Relevance
“…Thus, for any B ∈ F L B ×K q , span(A) ⊆ span(B), we have a bound on P (E 3 ∩ E c 1 |M) that tends to zero as n → ∞ if for all full rank C ∈ F L C ×L B q , 0 ≤ L C < L B , there exists an S that satisfies (36) and…”
Section: Further Definementioning
confidence: 99%
“…Thus, for any B ∈ F L B ×K q , span(A) ⊆ span(B), we have a bound on P (E 3 ∩ E c 1 |M) that tends to zero as n → ∞ if for all full rank C ∈ F L C ×L B q , 0 ≤ L C < L B , there exists an S that satisfies (36) and…”
Section: Further Definementioning
confidence: 99%
“…In essence, the structured interference observed by the relay can be exploited to achieve strong secrecy in the wireless transmissions [25], [26]. In [26]- [29] the role of interference in achieving strong secrecy was demonstrated using lattice encoders; however [27] and [28] rely on the use of random dithering and good nested lattice codes in arbitrarily high dimensions. In the wiretap channel studied in [29] the superposition of the interference to the data was viewed as a modulo addition operation, i.e., the superposition was assumed to take place in the code space and not in the signal space.…”
Section: First Transmission Cyclementioning
confidence: 99%
“…In coding, lattice Gaussian distribution was employed to obtain the full shaping gain for lattice coding [2], [3], and to achieve the capacity of the Gaussian channel [4]. It was also used to achieve information-theoretic security in the Gaussian wiretap channel [5], [6] and in the bidirectional relay channel [7], respectively. In cryptography, the lattice Gaussian distribution has become a central tool in the construction of many primitives [8]- [10].…”
Section: Introductionmentioning
confidence: 99%