On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback

Two-user Gaussian multiple-access wiretap channel models with feedback are investigated. First, we show that the secrecy capacity regions of both the Gaussian multiple-access wiretap channel (GMAC-WT) with feedback and the GMAC-WT with noncausal channel state information at the transmitters (GMAC-WT-NCSIT) and feedback equal the capacity region of the Gaussian multiple-access channel (GMAC) with feedback and without the secrecy constraint and the state corruption. Next, we derive inner and outer bounds on the secrecy capacity region of the GMAC-WT with degraded message set and feedback. Our numerical results show that the perfect secrecy of the private message can be achieved without loss of any reliable transmission rate.

[1]  Bin Dai,et al.  Some New Results on the Gaussian Wiretap Feedback Channel , 2019, Entropy.

[2]  Shlomo Shamai,et al.  The Dirty Paper Wiretap Feedback Channel with or without Action on the State , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[3]  Yingbin Liang,et al.  Secrecy Capacity of Colored Gaussian Noise Channels With Feedback , 2018, IEEE Transactions on Information Theory.

[4]  Yuan Luo,et al.  An Improved Feedback Coding Scheme for the Wire-Tap Channel , 2019, IEEE Transactions on Information Forensics and Security.

[5]  Shlomo Shamai,et al.  The wiretap channel with generalized feedback: Secure communication and key generation , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).

[6]  Ghosheh Abed Hodtani,et al.  On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information , 2015, IEEE Transactions on Information Forensics and Security.

[7]  Lior Dikstein,et al.  MAC with action-dependent state information at one encoder , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[8]  Ramji Venkataramanan,et al.  A New Achievable Rate Region for the Multiple-Access Channel With Noiseless Feedback , 2011, IEEE Transactions on Information Theory.

[9]  Robert G. Gallager,et al.  Variations on a Theme by Schalkwijk and Kailath , 2008, IEEE Transactions on Information Theory.

[10]  H. Vincent Poor,et al.  Secret communication with feedback , 2008, 2008 International Symposium on Information Theory and Its Applications.

[11]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[12]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[13]  Aviv Rosenzweig,et al.  The Capacity of Gaussian Multi-User Channels With State and Feedback , 2007, IEEE Transactions on Information Theory.

[14]  Rudolf Ahlswede,et al.  Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels with Secure Feedback from the Decoder , 2005, GTIT-C.

[15]  T. Kailath,et al.  A coding scheme for additive noise channels with feedback, Part I: No bandwith constraint , 1998 .

[16]  Lawrence H. Ozarow,et al.  The capacity of the white Gaussian multiple access channel with feedback , 1984, IEEE Trans. Inf. Theory.

[17]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  D. Slepian,et al.  A coding theorem for multiple access channels with correlated sources , 1973 .