2012
DOI: 10.1109/tit.2011.2181329
|View full text |Cite
|
Sign up to set email alerts
|

Wiretap Channel With Causal State Information

Abstract: Abstract-A lower bound on the secrecy capacity of the wiretap channel with state information available causally at both the encoder and decoder is established. The lower bound is shown to be strictly larger than that for the noncausal case by Liu and Chen. Achievability is proved using block Markov coding, Shannon strategy, and key generation from common state information. The state sequence available at the end of each block is used to generate a key, which is used to enhance the transmission rate of the conf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

6
135
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(141 citation statements)
references
References 15 publications
6
135
0
Order By: Relevance
“…, is similar to that in [7], the analysis of the error probability is similar, and the jointly typical u n (l) is identified with high probability. The probability that a different sequence is identified is arbitrarily close to zero.…”
Section: {I(u ; Y |S) − I(u ; Z|s)supporting
confidence: 55%
See 3 more Smart Citations
“…, is similar to that in [7], the analysis of the error probability is similar, and the jointly typical u n (l) is identified with high probability. The probability that a different sequence is identified is arbitrarily close to zero.…”
Section: {I(u ; Y |S) − I(u ; Z|s)supporting
confidence: 55%
“…B}, we split the message to three parts as before, yet protect the first two with the state key. The state information key k s j−1 is split to two independent parts, k s (j−1,0) and k s (j−1,1) at rates which coincides with case 2 of R S−CSI−1 in [7]. Thus, compared with the first case ofR 1 , to send message…”
Section: {I(u ; Y |S) − I(u ; Z|s)mentioning
confidence: 99%
See 2 more Smart Citations
“…The model and results bear some similarities with those of the concurrent work in [16], [17] and we draw similar conclusions regarding the usefulness of CSIT. Strictly speaking, all the models studied in the remainder of the paper can be viewed as direct extensions of the discrete memoryless wiretap channels with causal CSI [18], [19], for which the secrecy capacity and secret-key capacity are often known; however, these results depend on auxiliary random variables and are not easily evaluated. In this paper, we extend these results by providing numerically computable expressions of achievable secure communication rates and secret-key capacity, which provide insight beyond that of the known singleletter expressions; we also establish strong secrecy rates by leveraging recent results on the secrecy capacity of arbitrary channels [20], [21].…”
Section: Introductionmentioning
confidence: 99%