Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel

11/28/2018
by   Noha Helal, et al.
0

We study channel resolvability for the discrete memoryless multiple-access channel with cribbing, i.e., the characterization of the amount of randomness required at the inputs to approximately produce a chosen i.i.d. output distribution according to KL divergence. We analyze resolvability rates when one encoder cribs (i) the input of the other encoder; or the output of the other encoder, (ii) non-causally, (iii) causally, or (iv) strictly-causally. For scenarios (i)-(iii), we exactly characterize the channel resolvability region. For (iv), we provide inner and outer bounds for the channel resolvability region; the crux of our achievability result is to handle the strict causality constraint with a block-Markov coding scheme in which dependencies across blocks are suitably hidden. Finally, we leverage the channel resolvability results to derive achievable secrecy rate regions for each of the cribbing scenarios under strong secrecy constraints.

READ FULL TEXT

page 1

page 2

page 4

page 22

page 36

research
02/22/2019

Secrecy Rates for a Channel With Two Senders and Two Receivers

Motivated in part by the problem of secure multicast distributed storage...
research
03/07/2020

Strong Secrecy for General Multiple-Access Wiretap Channels

This paper is concerned with the general multiple access wiretap channel...
research
02/06/2018

Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy

In this paper, new two-user multiple access wiretap channel models are s...
research
06/25/2023

On Strong Secrecy for Multiple Access Channels with States and Causal CSI

Strong secrecy communication over a discrete memoryless state-dependent ...
research
07/29/2020

Feedback Capacities of Gaussian Multiple-Access Wiretap Channels

The feedback capacities of the Gaussian multiple-access channel (GMAC) a...
research
09/07/2020

Multiple Private Key Generation for Continuous Memoryless Sources with A Helper

We propose a method to study the secrecy constraints in key generation p...
research
07/10/2019

Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks

In communication networks secrecy constraints usually incur an extra lim...

Please sign up or login with your details

Forgot password? Click here to reset