首页> 外文期刊>IEEE Transactions on Information Theory >Wiretap and Gelfand-Pinsker Channels Analogy and Its Applications
【24h】

Wiretap and Gelfand-Pinsker Channels Analogy and Its Applications

机译:窃听和Gelfand-Pinsker通道类比及其应用

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

An analogy framework between wiretap channels (WTCs) and state-dependent point-to-point channels with non-causal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good sequence of stealth-wiretap codes is shown to induce a good sequence of codes for a corresponding GPC. Consequently, the framework enables exploiting existing results for GPCs to produce converse proofs for their wiretap analogs. The analogy readily extends to multiuser broadcasting scenarios, encompassing broadcast channels (BCs) with deterministic components, degradation ordering between users, and BCs with cooperative receivers. Given a wiretap BC (WTBC) with two receivers and one eavesdropper, an analogous Gelfand-Pinsker BC (GPBC) is constructed by converting the eavesdropper's observation sequence into a state sequence with an appropriate product distribution (induced by the stealth-wiretap code for the WTBC), and non-causally revealing the states to the encoder. The transition matrix of the state-dependent GPBC is extracted from WTBC's transition law, with the eavesdropper's output playing the role of the channel state. Past capacity results for the semi-deterministic (SD) GPBC and the physically-degraded (PD) GPBC with an informed receiver are leveraged to furnish analogy-based converse proofs for the analogous WTBC setups. This characterizes the secrecy-capacity regions of the SD-WTBC and the PD-WTBC, in which the stronger receiver also observes the eavesdropper's channel output. These derivations exemplify how the wiretap-GP analogy enables translating results on one problem into advances in the study of the other.
机译:提出了一个窃听通道(WTC)与状态相关的点对点通道之间的类比框架,该点对点通道具有非因果编码器通道状态信息(称为Gelfand-Pinker通道(GPC))。显示了良好的隐形窃听代码序列,可以为相应的GPC诱导良好的代码序列。因此,该框架能够利用GPC的现有结果为其窃听类似物提供相反的证明。这种类比很容易扩展到多用户广播场景,包括具有确定性组件的广播信道(BC),用户之间的降级顺序以及具有协作接收器的BC。给定一个带有两个接收器和一个窃听者的窃听BC(WTBC),通过将窃听者的观察序列转换为具有适当产品分布的状态序列,构造类似的Gelfand-Pinsker BC(GPBC)。 WTBC),并以非因果的方式向编码器显示状态。从WTBC的过渡定律中提取与状态相关的GPBC的过渡矩阵,窃听者的输出扮演通道状态的角色。半确定性(SD)GPBC和物理降级(PD)GPBC具有已知接收器的过去容量结果可用于为类似WTBC设置提供基于类比的逆向证明。这表征了SD-WTBC和PD-WTBC的保密能力区域,其中较强的接收器还观察到窃听者的信道输出。这些推导例证了窃听GP的类比如何将一个问题的结果转化为另一个问题的研究进展。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号