Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Wireless secrecy in cellular systems with infrastructure-aided cooperation
IEEE Transactions on Information Forensics and Security
Secrecy capacity of a class of broadcast channels with an eavesdropper
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secured communication over frequency-selective fading channels: a practical vandermonde precoding
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Capacity bounds for broadcast channels with confidential messages
IEEE Transactions on Information Theory
Capacity of cognitive interference channels with and without secrecy
IEEE Transactions on Information Theory
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
MIMO Gaussian broadcast channels with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
The secrecy capacity of the semi-deterministic broadcast channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
3-receiver broadcast channels with common and confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
The Gaussian many-to-one interference channel with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Secure communication with a Byzantine relay
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Secure diversity-multiplexing tradeoffs in MIMO relay channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Relay selection for secure cooperative networks with jamming
IEEE Transactions on Wireless Communications
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
IEEE Transactions on Information Theory
Interference channels with strong secrecy
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
On physically secure and stable slotted ALOHA system
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Robust beamforming design: From cognitive radio MISO channels to secrecy MISO channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure joint source-channel coding for quasi-static fading channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Ergodic secrecy capacity region of the fading broadcast channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Transactions on Communications
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Secure communications with insecure feedback: breaking the high-SNR ceiling
IEEE Transactions on Information Theory
Cooperation with an untrusted relay: a secrecy perspective
IEEE Transactions on Information Theory
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
IEEE Transactions on Information Theory
Cooperative secret communication with artificial noise in symmetric interference channel
IEEE Communications Letters
Two-hop secure communication using an untrusted relay
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
Security and Communication Networks
A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks
Wireless Personal Communications: An International Journal
Hi-index | 755.32 |
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers while ensuring mutual information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, derived bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.