MAC with partially cooperating encoders and security constraints

نویسندگان

  • Zohaib Hassan Awan
  • Abdellatif Zaidi
  • Luc Vandendorpe
چکیده

We study a special case of Willems’s two-user multiaccess channel with partially cooperating encoders from security perspective. This model differs from Willems’s setup in that only one encoder, Encoder 1, is allowed to conference, Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region. Furthermore, we show that these bounds coincide in the case of perfect secrecy, and so we characterize fully the secrecy capacity. For the Gaussian model, we establish lower and upper bounds on the perfect secrecy rate. We also show that these bounds agree in some extreme cases of cooperation between encoders. We illustrate our results through some numerical examples.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achievable rate region for the Gaussian MIMO MAC with cooperating encoders

This paper considers a Gaussian two-user multiple-input multiple-output (MIMO) multiple access channel (MAC) with cooperating encoders. After defining a form of cooperation strategy, we derive achievable rate bounds by applying the results obtained by Willems for the MAC with generalised feedback. Then, we characterise an achievable rate region and also provide a lower bound for this region, wh...

متن کامل

The Classical-Quantum Multiple Access Channel with Conferencing Encoders and with Common Messages

We prove coding theorems for two scenarios of cooperating encoders for the multiple access channel with two classical inputs and one quantum output. In the first scenario (ccq-MAC with common messages), the two senders each have their private messages, but would also like to transmit common messages. In the second scenario (ccq-MAC with conferencing encoders), each sender has its own set of mes...

متن کامل

Information-Theoretical Security for Several Models of Multiple-Access Channel

Several security models of multiple-access channel (MAC) are investigated. First, we study the degraded MAC with confidential messages, where two users transmit their confidential messages (no common message) to a destination, and each user obtains a degraded version of the output of the MAC. Each user views the other user as a eavesdropper, and wishes to keep its confidential message as secret...

متن کامل

Arbitrarily varying multiple access channels with conferencing encoders: List decoding and finite coordination resources

Communication over channels that may vary in an arbitrary and unknown manner from channel use to channel use is studied. Such channels fall in the framework of arbitrarily varying channels (AVCs), for which it has been shown that the classical deterministic approaches with pre-specified encoder and decoder fail if the AVC is symmetrizable. However, more sophisticated strategies such as common r...

متن کامل

A Note on Cooperative Multiterminal Source Coding

We consider the multiterminal source coding problem with partially cooperating encoders. In the lossless case, we give a simple proof for a coding theorem that extends the result of Slepian and Wolf for non-cooperating encoders, resulting in a complete characterization of the rate region under this scenario. Then we extend this setup to consider an arbitrary pair of distortions (D1, D2), where ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011