On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds

by   Rick Fritschek, et al.

We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approach uses signal-scale alignment. We show achievable schemes which are independent of the rationality of the channel gains. Moreover, our results can differentiate between channel strengths, in particular between both users, and establishes secrecy rates dependent on this difference. We can show that the resulting achievable secrecy rates tend to the s.d.o.f. for vanishing channel gain differences. Moreover, we extend previous and develop new techniques to prove general s.d.o.f. bounds for varying channel strengths and show that our achievable schemes reach the bounds for certain channel gain parameters. We believe that our analysis is the next step towards a constant-gap analysis of the G-MAC-WT and the G-WT-H.


page 1

page 2

page 3

page 4


Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy

In this paper, new two-user multiple access wiretap channel models are s...

Secrecy Rates for a Channel With Two Senders and Two Receivers

Motivated in part by the problem of secure multicast distributed storage...

Achievable Degrees of Freedom for Closed-form Solution to Interference Alignment and Cancellation in Gaussian Interference Multiple Access Channel

A combined technique of interference alignment (IA) and interference can...

A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence

A new converse bound is presented for the two-user multiple-access chann...

Multiple-Access Channel with Independent Sources: Error Exponent Analysis

In this paper, an achievable error exponent for the multiple-access chan...

Performance Analysis of IOS-Assisted NOMA System with Channel Correlation and Phase Errors

In this paper, we investigate the performance of an intelligent omni-sur...

Semantic Security and the Second-Largest Eigenvalue of Biregular Graphs

It is investigated how to achieve semantic security for the wiretap chan...

Please sign up or login with your details

Forgot password? Click here to reset