2021
DOI: 10.1109/tit.2020.3039916
|View full text |Cite
|
Sign up to set email alerts
|

The Secrecy Capacity of Cost-Constrained Wiretap Channels

Abstract: In many information-theoretic channel coding problems, adding an input cost constraint to the operational setup amounts to restricting the optimization domain in the capacity formula. This paper shows that, in contrast to common belief, such a simple modification does not hold for the cost-constrained (CC) wiretap channel (WTC). The secrecy-capacity of the discrete memoryless (DM) WTC without cost constraints is described by a single auxiliary random variable. For the CC DM-WTC, however, we show that two auxil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 46 publications
0
10
0
Order By: Relevance
“…In [25], superposition coding scheme was applied to the wiretap channel with input constraint. It is proved that an additional auxiliary random variable is necessary to achieve the secrecy capacity of the wiretap channel in some cases.…”
Section: B Superposition Stochastic-encoder Code Boundsmentioning
confidence: 99%
See 2 more Smart Citations
“…In [25], superposition coding scheme was applied to the wiretap channel with input constraint. It is proved that an additional auxiliary random variable is necessary to achieve the secrecy capacity of the wiretap channel in some cases.…”
Section: B Superposition Stochastic-encoder Code Boundsmentioning
confidence: 99%
“…The advantage of applying superposition coding to the wiretap channel was investigated in [25]. In [25], it was proved that the superposition coding scheme can improve the capacity of ordinary wiretap channels in the presence of the input constraint. The argument also holds for the arbitrarily varying wiretap channel with input constraint and state constraint.…”
Section: B Superposition Stochastic-encoder Code Boundsmentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, the broadcast channel with confidential messages is a generalization of the wiretap channel. The requirement in ( 14) is referred to as strong secrecy (see e.g., [91]). Yet, this requirement is weaker than semantic security or indistinguishability.…”
Section: Confidential Coding With and Without Key Assistancementioning
confidence: 99%
“…e secrecy capacity in fading channels was investigated in [14][15][16][17][18]. Later on, secrecy capacity topic has been further studied in the context of multi-access channels, multiple-input multiple-output (MIMO) communications [1,19,20], cooperative networks [21,22], cellular networks [14,23,24], and IoT networks [5,25,26].…”
Section: Introductionmentioning
confidence: 99%