Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Wireless secrecy in cellular systems with infrastructure-aided cooperation
IEEE Transactions on Information Forensics and Security
Distributed detection with censoring sensors under physical layer secrecy
IEEE Transactions on Signal Processing
Secrecy capacity of a class of broadcast channels with an eavesdropper
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secrecy capacity of a class of orthogonal relay eavesdropper channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Capacity bounds for broadcast channels with confidential messages
IEEE Transactions on Information Theory
Authentication over noisy channels
IEEE Transactions on Information Theory
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
Coalitional games for distributed eavesdroppers cooperation in wireless networks
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
Information secrecy from multiple eavesdroppers in orthogonal relay channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
The secrecy capacity of the semi-deterministic broadcast channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Wiretap channel type II with an active eavesdropper
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
On the secrecy rate of interference networks using structured codes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Physical layer security: coalitional games for distributed cooperation
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
IEEE Transactions on Information Theory
Fading cognitive multiple-access channels with confidential messages
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Ergodic secrecy capacity region of the fading broadcast channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Transactions on Communications
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Cooperation with an untrusted relay: a secrecy perspective
IEEE Transactions on Information Theory
Cooperative secret communication with artificial noise in symmetric interference channel
IEEE Communications Letters
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Distributed Coalition Formation Games for Secure Wireless Transmission
Mobile Networks and Applications
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Strong secrecy for multiple access channels
Information Theory, Combinatorics, and Search Theory
Hi-index | 755.26 |
A discrete memoryless multiple-access channel (MAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the classical MAC model in that each user also receives channel outputs, and hence may obtain the confidential information sent by the other user from the channel output it receives. However, each user views the other user as a wiretapper or eavesdropper, and wishes to keep its confidential information as secret as possible from the other user. The level of secrecy of the confidential information is measured by the equivocation rate, i.e., the entropy rate of the confidential information conditioned on channel outputs at the wiretapper (the other user). The performance measure is the rate-equivocation tuple that includes the common rate, two private rates, and two equivocation rates as components. The set that includes all achievable rate-equivocation tuples is referred to as the capacity-equivocation region. The case of perfect secrecy is particularly of interest, in which each user's confidential information is perfectly hidden from the other user. The set that includes all achievable rates with perfect secrecy is referred to as the secrecy capacity region. For the MAC with two confidential messages, in which both users have confidential messages for the destination, inner bounds on the capacity-equivocation region, and secrecy capacity region are obtained. It is demonstrated that there is a tradeoff between the two equivocation rates (secrecy levels) achieved for the two confidential messages. For the MAC with one confidential message, in which only one user (user 1) has private (confidential) information for the destination, inner and outer bounds on the capacity-equivocation region are derived. These bounds match partially, and hence the capacity-equivocation region is partially characteri- - zed. Furthermore, the outer bound provides a tight converse for the case of perfect secrecy, and hence establishes the secrecy capacity region. A class of degraded MACs with one confidential message is further studied, and the capacity-equivocation region and the secrecy capacity region are established. These results are further explored via two example channels: the binary and Gaussian MACs. For both channels, the capacity-equivocation regions and the secrecy capacity regions are obtained.