Cargando…

Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback

For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted...

Descripción completa

Detalles Bibliográficos
Autores principales: Yuan, Haoheng, Xie, Guangfen, Dai, Bin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10527619/
https://www.ncbi.nlm.nih.gov/pubmed/37761639
http://dx.doi.org/10.3390/e25091339
_version_ 1785111165934764032
author Yuan, Haoheng
Xie, Guangfen
Dai, Bin
author_facet Yuan, Haoheng
Xie, Guangfen
Dai, Bin
author_sort Yuan, Haoheng
collection PubMed
description For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted message by the shared key. By secret sharing, any capacity-achieving coding scheme for the AWGN channel without feedback can be secure by itself, which indicates that the capacity of the same model without the secrecy constraint also affords an achievable secrecy rate to the AWGN channel with an eavesdropper and feedback. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? In this paper, we show that the answer to the aforementioned question is no, and propose the optimal feedback coding scheme for the AWGN-MAC-E-CF, which combines an existing linear feedback scheme for the AWGN MAC with feedback and the secret key scheme in the literature. This paper provides a way to find optimal coding schemes for AWGN multi-user channels in the presence of an external eavesdropper and channel feedback.
format Online
Article
Text
id pubmed-10527619
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-105276192023-09-28 Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback Yuan, Haoheng Xie, Guangfen Dai, Bin Entropy (Basel) Article For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted message by the shared key. By secret sharing, any capacity-achieving coding scheme for the AWGN channel without feedback can be secure by itself, which indicates that the capacity of the same model without the secrecy constraint also affords an achievable secrecy rate to the AWGN channel with an eavesdropper and feedback. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? In this paper, we show that the answer to the aforementioned question is no, and propose the optimal feedback coding scheme for the AWGN-MAC-E-CF, which combines an existing linear feedback scheme for the AWGN MAC with feedback and the secret key scheme in the literature. This paper provides a way to find optimal coding schemes for AWGN multi-user channels in the presence of an external eavesdropper and channel feedback. MDPI 2023-09-15 /pmc/articles/PMC10527619/ /pubmed/37761639 http://dx.doi.org/10.3390/e25091339 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yuan, Haoheng
Xie, Guangfen
Dai, Bin
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback
title Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback
title_full Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback
title_fullStr Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback
title_full_unstemmed Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback
title_short Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback
title_sort secrecy capacity region of the awgn mac with external eavesdropper and feedback
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10527619/
https://www.ncbi.nlm.nih.gov/pubmed/37761639
http://dx.doi.org/10.3390/e25091339
work_keys_str_mv AT yuanhaoheng secrecycapacityregionoftheawgnmacwithexternaleavesdropperandfeedback
AT xieguangfen secrecycapacityregionoftheawgnmacwithexternaleavesdropperandfeedback
AT daibin secrecycapacityregionoftheawgnmacwithexternaleavesdropperandfeedback