This paper investigates the problem of secure transmission over a two-user discrete memoryless multiple-access wiretap channel with partial rate-limited feedback (MAC-WT-PLF). The receiver can causally and securely transmit feedback to one of the transmitters at a limited rate. Three achievable rate regions and one outer bound on the secrecy capacity are presented based on three proposed coding schemes and the Sato-type bounding approach. The proposed coding schemes show that the feedback can play multiple roles, i.e., encrypting part of messages, enlarging the size of the dummy message, and increasing the correlation between the channel inputs, to enhance the secrecy performance. Of particular interest is identifying the novel role of enlarging the size of the dummy message at one of the transmitters, which enables both transmitters to benefit from the feedback significantly. In addition, the proposed achievable rate regions and outer bound are computed for the Gaussian MAC-WT-PLF, and comparative numerical results are provided under different eavesdropping cases.
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback
Tomasin, Stefano
2024
Abstract
This paper investigates the problem of secure transmission over a two-user discrete memoryless multiple-access wiretap channel with partial rate-limited feedback (MAC-WT-PLF). The receiver can causally and securely transmit feedback to one of the transmitters at a limited rate. Three achievable rate regions and one outer bound on the secrecy capacity are presented based on three proposed coding schemes and the Sato-type bounding approach. The proposed coding schemes show that the feedback can play multiple roles, i.e., encrypting part of messages, enlarging the size of the dummy message, and increasing the correlation between the channel inputs, to enhance the secrecy performance. Of particular interest is identifying the novel role of enlarging the size of the dummy message at one of the transmitters, which enables both transmitters to benefit from the feedback significantly. In addition, the proposed achievable rate regions and outer bound are computed for the Gaussian MAC-WT-PLF, and comparative numerical results are provided under different eavesdropping cases.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.