Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks

07/10/2019
by   Fan Li, et al.
0

In communication networks secrecy constraints usually incur an extra limit in capacity or generalized degrees-of-freedom (GDoF), in the sense that a penalty in capacity or GDoF is incurred due to the secrecy constraints. Over the past decades a significant amount of effort has been made by the researchers to understand the limits of secrecy constraints in communication networks. In this work, we focus on how to remove the secrecy constraints in communication networks, i.e., how to remove the GDoF penalty due to secrecy constraints. We begin with three basic settings: a two-user symmetric Gaussian interference channel with confidential messages, a symmetric Gaussian wiretap channel with a helper, and a two-user symmetric Gaussian multiple access wiretap channel. Interestingly, in this work we show that adding common randomness at the transmitters can totally remove the penalty in GDoF or GDoF region of the three settings considered here. The results reveal that adding common randomness at the transmitters is a powerful way to remove the secrecy constraints in communication networks in terms of GDoF performance. Common randomness can be generated offline. The role of the common randomness is to jam the information signal at the eavesdroppers, without causing too much interference at the legitimate receivers. To accomplish this role, a new method of Markov chain-based interference neutralization is proposed in the achievability schemes utilizing common randomness. From the practical point of view, we hope to use less common randomness to remove secrecy constraints in terms of GDoF performance. With this motivation, for most of the cases we characterize the minimal GDoF of common randomness to remove secrecy constraints, based on our derived converses and achievability.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/03/2018

Adding a Helper Can Totally Remove the Secrecy Constraints in Interference Channel

In many communication channels, secrecy constraints usually incur a pena...
research
12/26/2018

Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper

We study a symmetric Gaussian wiretap channel with a helper, where a con...
research
02/22/2019

Secrecy Rates for a Channel With Two Senders and Two Receivers

Motivated in part by the problem of secure multicast distributed storage...
research
03/07/2020

Strong Secrecy for General Multiple-Access Wiretap Channels

This paper is concerned with the general multiple access wiretap channel...
research
04/09/2020

The Secrecy Capacity of Cost-Constrained Wiretap Channels

In many information-theoretic communication problems, adding an input co...
research
11/28/2018

Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel

We study channel resolvability for the discrete memoryless multiple-acce...
research
02/12/2020

Fundamental Limits of Biometric Identification Systems with Strong Secrecy

The fundamental limits of biometric identification systems under a stron...

Please sign up or login with your details

Forgot password? Click here to reset