On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds

12/12/2017
by   Rick Fritschek, et al.
0

We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approach uses signal-scale alignment. We show achievable schemes which are independent of the rationality of the channel gains. Moreover, our results can differentiate between channel strengths, in particular between both users, and establishes secrecy rates dependent on this difference. We can show that the resulting achievable secrecy rates tend to the s.d.o.f. for vanishing channel gain differences. Moreover, we extend previous and develop new techniques to prove general s.d.o.f. bounds for varying channel strengths and show that our achievable schemes reach the bounds for certain channel gain parameters. We believe that our analysis is the next step towards a constant-gap analysis of the G-MAC-WT and the G-WT-H.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/06/2018

Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy

In this paper, new two-user multiple access wiretap channel models are s...
research
02/22/2019

Secrecy Rates for a Channel With Two Senders and Two Receivers

Motivated in part by the problem of secure multicast distributed storage...
research
08/01/2019

Achievable Degrees of Freedom for Closed-form Solution to Interference Alignment and Cancellation in Gaussian Interference Multiple Access Channel

A combined technique of interference alignment (IA) and interference can...
research
07/30/2020

A Second-Order Converse Bound for the Multiple-Access Channel via Wringing Dependence

A new converse bound is presented for the two-user multiple-access chann...
research
05/29/2018

Multiple-Access Channel with Independent Sources: Error Exponent Analysis

In this paper, an achievable error exponent for the multiple-access chan...
research
12/21/2021

Performance Analysis of IOS-Assisted NOMA System with Channel Correlation and Phase Errors

In this paper, we investigate the performance of an intelligent omni-sur...
research
11/19/2018

Semantic Security and the Second-Largest Eigenvalue of Biregular Graphs

It is investigated how to achieve semantic security for the wiretap chan...

Please sign up or login with your details

Forgot password? Click here to reset