MAC with partially cooperating encoders and security constraints
نویسندگان
چکیده
We study a special case of Willems’s two-user multiaccess channel with partially cooperating encoders from security perspective. This model differs from Willems’s setup in that only one encoder, Encoder 1, is allowed to conference, Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region. Furthermore, we show that these bounds coincide in the case of perfect secrecy, and so we characterize fully the secrecy capacity. For the Gaussian model, we establish lower and upper bounds on the perfect secrecy rate. We also show that these bounds agree in some extreme cases of cooperation between encoders. We illustrate our results through some numerical examples.
منابع مشابه
Achievable rate region for the Gaussian MIMO MAC with cooperating encoders
This paper considers a Gaussian two-user multiple-input multiple-output (MIMO) multiple access channel (MAC) with cooperating encoders. After defining a form of cooperation strategy, we derive achievable rate bounds by applying the results obtained by Willems for the MAC with generalised feedback. Then, we characterise an achievable rate region and also provide a lower bound for this region, wh...
متن کاملThe Classical-Quantum Multiple Access Channel with Conferencing Encoders and with Common Messages
We prove coding theorems for two scenarios of cooperating encoders for the multiple access channel with two classical inputs and one quantum output. In the first scenario (ccq-MAC with common messages), the two senders each have their private messages, but would also like to transmit common messages. In the second scenario (ccq-MAC with conferencing encoders), each sender has its own set of mes...
متن کاملInformation-Theoretical Security for Several Models of Multiple-Access Channel
Several security models of multiple-access channel (MAC) are investigated. First, we study the degraded MAC with confidential messages, where two users transmit their confidential messages (no common message) to a destination, and each user obtains a degraded version of the output of the MAC. Each user views the other user as a eavesdropper, and wishes to keep its confidential message as secret...
متن کاملArbitrarily varying multiple access channels with conferencing encoders: List decoding and finite coordination resources
Communication over channels that may vary in an arbitrary and unknown manner from channel use to channel use is studied. Such channels fall in the framework of arbitrarily varying channels (AVCs), for which it has been shown that the classical deterministic approaches with pre-specified encoder and decoder fail if the AVC is symmetrizable. However, more sophisticated strategies such as common r...
متن کاملA Note on Cooperative Multiterminal Source Coding
We consider the multiterminal source coding problem with partially cooperating encoders. In the lossless case, we give a simple proof for a coding theorem that extends the result of Slepian and Wolf for non-cooperating encoders, resulting in a complete characterization of the rate region under this scenario. Then we extend this setup to consider an arbitrary pair of distortions (D1, D2), where ...
متن کامل