Abstract
The problem of sending a secret message over the Gaussian multiple-input multiple-output wiretap channel is studied. In a recent work, we have proposed a layered coding scheme where a scalar wiretap code is used in each layer, and successive interference cancellation (SIC) is carried at the legitimate receiver. By a proper rate allocation across the layers, we showed that this scheme satisfies the secrecy constraint at the eavesdropper and achieves the secrecy capacity. However, the existence of the scalar codes was based upon a random coding argument. In this work we take a further step and show how the scheme can be based upon any codes that are good for the ordinary (non-secrecy) additive white Gaussian noise channel. As any stage of the SIC process is equivalent to achieving a corner point of a Gaussian multiple-access channel (MAC) capacity region, the class of codes used needs to be good for the MAC under SIC. Since in the secrecy analysis of our layered scheme, it suffices at each stage to consider a genie-aided eavesdropper that performs SIC, the coding task reduces to guaranteeing secrecy for corner points of induced MACs to the eavesdropper. Structured generation of such codes from ordinary ones is discussed.
Original language | English |
---|---|
Title of host publication | 2014 IEEE Information Theory Workshop, ITW 2014 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 631-635 |
Number of pages | 5 |
ISBN (Electronic) | 9781479959990 |
DOIs | |
State | Published - 1 Dec 2014 |
Event | 2014 IEEE Information Theory Workshop, ITW 2014 - Hobart, Australia Duration: 2 Nov 2014 → 5 Nov 2014 |
Publication series
Name | 2014 IEEE Information Theory Workshop, ITW 2014 |
---|
Conference
Conference | 2014 IEEE Information Theory Workshop, ITW 2014 |
---|---|
Country/Territory | Australia |
City | Hobart |
Period | 2/11/14 → 5/11/14 |
Bibliographical note
Publisher Copyright:© 2014 IEEE.