메뉴 건너뛰기




Volumn 54, Issue 6, 2008, Pages 2735-2751

The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming

Author keywords

Confidential messages; Gaussian multiple access channel (GMAC); Gaussian two way channel; Secrecy capacity; Wiretap channel

Indexed keywords

BEAMFORMING; CANNING; COMPUTER NETWORKS; ELECTRONIC WARFARE; GAUSSIAN DISTRIBUTION; JAMMING; MILITARY OPERATIONS; TRELLIS CODES;

EID: 45249101530     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.921680     Document Type: Article
Times cited : (771)

References (47)
  • 1
    • 45249124902 scopus 로고    scopus 로고
    • R. Ahlswede, Multi-way communication channels, in Proc. 2nd. Int. Symp. Inf. Theory, Tsahkadsor, Armenian S.S.R., 1971, pp. 23-52.
    • R. Ahlswede, "Multi-way communication channels," in Proc. 2nd. Int. Symp. Inf. Theory, Tsahkadsor, Armenian S.S.R., 1971, pp. 23-52.
  • 2
    • 0003914376 scopus 로고
    • Multiple access channels,
    • Ph.D. dissertation, Dept. Electr. Engr, Univ. Hawaii, Honolulu, HI
    • H. Liao, "Multiple access channels," Ph.D. dissertation, Dept. Electr. Engr., Univ. Hawaii, Honolulu, HI, 1972.
    • (1972)
    • Liao, H.1
  • 4
    • 0018443950 scopus 로고
    • The capacity region of the two-way channel can exceed the inner bound
    • G. Dueck, "The capacity region of the two-way channel can exceed the inner bound," Inf. Control, no. 40, pp. 258-266, 1979.
    • (1979) Inf. Control , Issue.40 , pp. 258-266
    • Dueck, G.1
  • 5
    • 0021157174 scopus 로고
    • A general coding scheme for the two-way channel
    • Jan
    • T. S. Han, "A general coding scheme for the two-way channel," IEEE Trans. Inf. Theory, vol. IT-30, no. 1, pp. 35-44, Jan. 1984.
    • (1984) IEEE Trans. Inf. Theory , vol.IT-30 , Issue.1 , pp. 35-44
    • Han, T.S.1
  • 6
    • 0000456843 scopus 로고
    • The capacity region of a channel with two senders and two receivers
    • R. Ahlswede, "The capacity region of a channel with two senders and two receivers," Ann. Probab., vol. 2, no. 5, pp. 805-814, 1974.
    • (1974) Ann. Probab , vol.2 , Issue.5 , pp. 805-814
    • Ahlswede, R.1
  • 7
    • 0017495152 scopus 로고
    • Two-user communication channels
    • May
    • H. Sato, "Two-user communication channels," IEEE Trans. Inf. Theory vol. IT-23, no. 3, pp. 295-304, May 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.IT-23 , Issue.3 , pp. 295-304
    • Sato, H.1
  • 8
    • 0019187817 scopus 로고
    • Multiple user information theory
    • Dec
    • A. El Gamal and T. Cover, "Multiple user information theory," Proc. IEEE, vol. 68, no. 12, pp. 1466-1483, Dec. 1980.
    • (1980) Proc. IEEE , vol.68 , Issue.12 , pp. 1466-1483
    • El Gamal, A.1    Cover, T.2
  • 9
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 10
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 11
    • 0017495724 scopus 로고
    • A note on Wyner's wiretap channel
    • May
    • A. B. Carleial and M. E. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. IT-23, no. 3, pp. 387-390, May 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.IT-23 , Issue.3 , pp. 387-390
    • Carleial, A.B.1    Hellman, M.E.2
  • 13
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 14
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Berlin, Germany: Springer-Verlag
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Lecture Notes in Computer Science Berlin, Germany: Springer-Verlag, 2000, vol. 1807, pp. 351-368.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 15
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 17
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • Jul
    • R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahslwede, R.1    Csiszár, I.2
  • 18
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography - Part II: CR capacity
    • Jan
    • R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography - Part II: CR capacity," IEEE Trans. Inf. Theory vol. 44, no. 1, pp. 225-240, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahslwede, R.1    Csiszár, I.2
  • 19
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 20
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.1    Wolf, S.2
  • 21
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 22
    • 0031647696 scopus 로고    scopus 로고
    • The common randomness capacity of a pair of independent discrete memoryless channels
    • Jan
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 215-224, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 215-224
    • Venkatesan, S.1    Anantharam, V.2
  • 23
    • 0033892497 scopus 로고    scopus 로고
    • The common randomness capacity of a network of discrete memoryless channels
    • Mar
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Trans. Inf. Theory vol. 46, no. 2, pp. 367-387, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 367-387
    • Venkatesan, S.1    Anantharam, V.2
  • 24
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 25
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 26
    • 0022722755 scopus 로고
    • On secret sharing communication systems with two or three channels
    • May
    • H. Yamamoto, "On secret sharing communication systems with two or three channels," IEEE Trans. Inf. Theory, vol. IT-32, no. 3, pp. 387-393, May 1986.
    • (1986) IEEE Trans. Inf. Theory , vol.IT-32 , Issue.3 , pp. 387-393
    • Yamamoto, H.1
  • 27
    • 0026153306 scopus 로고
    • A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
    • May
    • H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.3 , pp. 634-638
    • Yamamoto, H.1
  • 28
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, 2001, pp. 87-89.
    • (2001) Proc. IEEE Inf. Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 29
    • 39049144353 scopus 로고    scopus 로고
    • Secrecy capacity of wireless channels
    • Seattle, WA, Jul. 9-14
    • J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 356-360.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory , pp. 356-360
    • Barros, J.1    Rodrigues, M.R.D.2
  • 33
    • 84940648008 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages
    • Monticello, IL, Sep. 27-29
    • R. Liu, I. Marie, R. D. Yates, and P. Spasojevic, "Discrete memoryless interference and broadcast channels with confidential messages," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
    • (2006) Proc. Allerton Conf. Commun. Control Comput
    • Liu, R.1    Marie, I.2    Yates, R.D.3    Spasojevic, P.4
  • 34
    • 45249119708 scopus 로고    scopus 로고
    • Generalized multiple access channels with confidential messages
    • accepted for publication
    • Y. Liang and V. Poor, "Generalized multiple access channels with confidential messages," IEEE Trans. Inf. Theory, accepted for publication.
    • IEEE Trans. Inf. Theory
    • Liang, Y.1    Poor, V.2
  • 35
    • 39049089566 scopus 로고    scopus 로고
    • The discrete memoryless multiple access channel with confidential messages
    • Seattle, WA, Jul. 9-14
    • R. Liu, I. Marie, R. D. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 957-961.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory , pp. 957-961
    • Liu, R.1    Marie, I.2    Yates, R.D.3    Spasojevic, P.4
  • 36
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas: The MISOME wiretap channel
    • submitted for publication
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Khisti, A.1    Wornell, G.W.2
  • 37
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
    • submitted for publication
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 38
    • 33847609636 scopus 로고    scopus 로고
    • On secure signaling for the Gaussian multiple access wire-tap channel
    • Asilomar, CA, Nov. 1
    • E. Tekin, S. Şerbetli, and A. Yener, "On secure signaling for the Gaussian multiple access wire-tap channel," in Proc. Asilomar Conf. Signal Syst. Comput., Asilomar, CA, Nov. 1, 2005, pp. 1747-1751.
    • (2005) Proc. Asilomar Conf. Signal Syst. Comput , pp. 1747-1751
    • Tekin, E.1    Şerbetli, S.2    Yener, A.3
  • 39
    • 39049168628 scopus 로고    scopus 로고
    • The Gaussian multiple-access wire-tap channel with collective secrecy constraints
    • Seattle, WA, Jul. 9-14
    • E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel with collective secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 1164-1168.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory , pp. 1164-1168
    • Tekin, E.1    Yener, A.2
  • 40
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple-access wire-tap channel
    • Online, Available:, submitted for publication
    • E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel," IEEE Trans. Inf. Theory [Online]. Available: http://arxiv.org/format/cs.IT/0605028, submitted for publication
    • IEEE Trans. Inf. Theory
    • Tekin, E.1    Yener, A.2
  • 41
    • 84940659555 scopus 로고    scopus 로고
    • Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
    • Monticello, IL, Sep. 27-29
    • E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
    • (2006) Proc. Allerton Conf. Commun. Control Comput
    • Tekin, E.1    Yener, A.2
  • 42
    • 40949121595 scopus 로고    scopus 로고
    • Achievable rates for two-way wire-tap channels
    • Nice, France, Jun. 24-29
    • E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory
    • Tekin, E.1    Yener, A.2
  • 43
    • 0017918923 scopus 로고
    • Interference channels
    • Jan
    • A. B. Carleial, "Interference channels," IEEE Trans. Inf. Theory vol. IT-24, no. 1, pp. 60-70, Jan. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.1 , pp. 60-70
    • Carleial, A.B.1
  • 45
    • 84857709521 scopus 로고    scopus 로고
    • Secrecy sum-rates for the multiple-access wire-tap channel with ergodic block fading
    • Monticello, IL, Sep. 26-28
    • E. Tekin and A. Yener, "Secrecy sum-rates for the multiple-access wire-tap channel with ergodic block fading," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 26-28, 2007.
    • (2007) Proc. Allerton Conf. Commun. Control Comput
    • Tekin, E.1    Yener, A.2
  • 47
    • 45249115450 scopus 로고    scopus 로고
    • Wireless information-theoretic security - Part II: Practical implementation
    • accepted for publication
    • M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security - Part II: Practical implementation," IEEE Trans. Inf. Theory, accepted for publication.
    • IEEE Trans. Inf. Theory
    • Bloch, M.1    Barros, J.2    Rodrigues, M.R.D.3    McLaughlin, S.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.