메뉴 건너뛰기




Volumn 9, Issue 2, 2014, Pages 182-195

A general framework of wiretap channel with helping interference and state information

Author keywords

artificial state; helping interference; Information theoretic secrecy; state information; wiretap channel

Indexed keywords

ARTIFICIAL STATE; DYNAMIC CHANNELS; INFORMATION THEORETIC SECRECY; NUMERICAL RESULTS; PASSIVE EAVESDROPPERS; SECURITY LEVEL; STATE INFORMATION; WIRE-TAP CHANNELS;

EID: 84893411461     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2295031     Document Type: Article
Times cited : (22)

References (30)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Jan.
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 3
    • 38349115043 scopus 로고    scopus 로고
    • Wiretap channel with side information
    • Jan.
    • Y. Chen and A. Han Vinck, "Wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 395-402, Jan. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.1 , pp. 395-402
    • Chen, Y.1    Vinck, A.H.2
  • 4
    • 33646073724 scopus 로고    scopus 로고
    • An achievable region for the Gaussian wiretap channel with side information
    • May
    • C. Mitrpant, A. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.5 , pp. 2181-2190
    • Mitrpant, C.1    Vinck, A.2    Luo, Y.3
  • 5
    • 80051780323 scopus 로고    scopus 로고
    • Secret-key agreement with channel state information at the transmitter
    • Sep.
    • A. Khisti, S. N. Diggavi, and G. W.Wornell, "Secret-key agreement with channel state information at the transmitter," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 672-681, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 672-681
    • Khisti, A.1    Diggavi, S.N.2    Wornell, G.W.3
  • 6
    • 84860260503 scopus 로고    scopus 로고
    • Wiretap channel with causal state information
    • May
    • Y.-K. Chia and A. El Gamal, "Wiretap channel with causal state information," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 2838-2849, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 2838-2849
    • Chia, Y.-K.1    Gamal, A.E.2
  • 7
    • 79955491895 scopus 로고    scopus 로고
    • Interference-assisted secret communication
    • May
    • X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Interference-assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 3153-3167
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.4
  • 8
    • 77951565555 scopus 로고    scopus 로고
    • Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling
    • Nov./Dec.
    • X. He and A. Yener, "Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling," in Proc. IEEE Global Telecommun. Conf., Nov./Dec. 2009, pp. 1-6.
    • (2009) Proc. IEEE Global Telecommun. Conf. , pp. 1-6
    • He, X.1    Yener, A.2
  • 9
    • 84881483763 scopus 로고    scopus 로고
    • Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming
    • Mar.
    • J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming," in Proc. CISS, Mar. 2013, pp. 1-5.
    • (2013) Proc. CISS , pp. 1-5
    • Xie, J.1    Ulukus, S.2
  • 10
    • 84870266491 scopus 로고    scopus 로고
    • Deaf cooperation for secrecy with multiple antennas at the helper
    • Dec.
    • R. Bassily and S. Ulukus, "Deaf cooperation for secrecy with multiple antennas at the helper," IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1885-1864, Dec. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.6 , pp. 1885-1864
    • Bassily, R.1    Ulukus, S.2
  • 11
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • Jun.
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 12
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 13
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • Jun.
    • R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.4
  • 14
    • 80052369884 scopus 로고    scopus 로고
    • Cooperative encoding for secrecy in interference channels
    • Sep.
    • O. Koyluoglu and H. El Gamal, "Cooperative encoding for secrecy in interference channels," IEEE Trans. Inf. Theory, vol. 57, no. 9, pp. 5682-5694, Sep. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.9 , pp. 5682-5694
    • Koyluoglu, O.1    Gamal, H.E.2
  • 15
  • 16
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 17
    • 46749102916 scopus 로고    scopus 로고
    • Multiple access channels with generalized feedback and confidential messages
    • Sep.
    • X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Multiple access channels with generalized feedback and confidential messages," in Proc. IEEE Inf. Theory Workshop, Sep. 2007, pp. 608-613.
    • (2007) Proc. IEEE Inf. Theory Workshop , pp. 608-613
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.4
  • 18
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • DOI 10.1109/TIT.2007.915978
    • Y. Liang and H. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 19
    • 84888354468 scopus 로고    scopus 로고
    • Rate regions for multiple access channel with conference and secrecy constraints
    • Dec.
    • P. Xu, Z. Ding, and X. Dai, "Rate regions for multiple access channel with conference and secrecy constraints," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1961-1974, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1961-1974
    • Xu, P.1    Ding, Z.2    Dai, X.3
  • 20
    • 70349616112 scopus 로고    scopus 로고
    • Capacity bounds for broadcast channels with confidential messages
    • Oct.
    • J. Xu, Y. Cao, and B. Chen, "Capacity bounds for broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4529-4542, Oct. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.10 , pp. 4529-4542
    • Xu, J.1    Cao, Y.2    Chen, B.3
  • 21
    • 78650894311 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jan.
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 137-155
    • Ekrem, E.1    Ulukus, S.2
  • 23
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 24
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • Nov./Dec.
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf., Nov./Dec. 2008, pp. 1-5.
    • (2008) Proc. IEEE Global Telecommun. Conf. , pp. 1-5
    • He, X.1    Yener, A.2
  • 25
    • 79957667257 scopus 로고    scopus 로고
    • Interference alignment for secrecy
    • Jun.
    • O. Koyluoglu, H. El Gamal, L. Lai, and H. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.6 , pp. 3323-3332
    • Koyluoglu, O.1    Gamal, H.E.2    Lai, L.3    Poor, H.4
  • 28
    • 0019148101 scopus 로고
    • Coding for channel with random parameters
    • S. Gelfand and M. Pinsker, "Coding for channel with random parameters," Problems Control Inf. Theory, vol. 9, no. 1, pp. 19-31, 1980.
    • (1980) Problems Control Inf. Theory , vol.9 , Issue.1 , pp. 19-31
    • Gelfand, S.1    Pinsker, M.2
  • 30
    • 0020752342 scopus 로고
    • Writing on dirty paper (corresp.)
    • May
    • M. Costa, "Writing on dirty paper (corresp.)," IEEE Trans. Inf. Theory, vol. 29, no. 3, pp. 439-441, May 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.3 , pp. 439-441
    • Costa, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.