From ordinary AWGN codes to optimal MIMO wiretap schemes

The problem of sending a secret message over the Gaussian multiple-input multiple-output wiretap channel is studied. In a recent work, we have proposed a layered coding scheme where a scalar wiretap code is used in each layer, and successive interference cancellation (SIC) is carried at the legitimate receiver. By a proper rate allocation across the layers, we showed that this scheme satisfies the secrecy constraint at the eavesdropper and achieves the secrecy capacity. However, the existence of the scalar codes was based upon a random coding argument. In this work we take a further step and show how the scheme can be based upon any codes that are good for the ordinary (non-secrecy) additive white Gaussian noise channel. As any stage of the SIC process is equivalent to achieving a corner point of a Gaussian multiple-access channel (MAC) capacity region, the class of codes used needs to be good for the MAC under SIC. Since in the secrecy analysis of our layered scheme, it suffices at each stage to consider a genie-aided eavesdropper that performs SIC, the coding task reduces to guaranteeing secrecy for corner points of induced MACs to the eavesdropper. Structured generation of such codes from ordinary ones is discussed.

[1]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[2]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[3]  Henry Herng-Jiunn Liao,et al.  Multiple access channels (Ph.D. Thesis abstr.) , 1973, IEEE Trans. Inf. Theory.

[4]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[5]  Frédérique E. Oggier,et al.  Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2016, IEEE Trans. Inf. Theory.

[6]  Babak Hassibi,et al.  An efficient square-root algorithm for BLAST , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[7]  Rudolf Ahlswede,et al.  Multi-way communication channels , 1973 .

[8]  Yuval Kochman,et al.  Decomposing the MIMO wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.

[9]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[10]  François Baccelli,et al.  Interference Networks With Point-to-Point Codes , 2011, IEEE Transactions on Information Theory.

[11]  Alexander Vardy,et al.  Semantic Security for the Wiretap Channel , 2012, CRYPTO.

[12]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[13]  G. Forney,et al.  Generalized Decision-Feedback Equalization for Packet Transmission with ISI and Gaussian Noise , 1997 .

[14]  Himanshu Tyagi,et al.  Explicit capacity-achieving coding scheme for the Gaussian wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.

[15]  Matsumoto Ryutaroh,et al.  Construction of wiretap codes from ordinary channel codes , 2010 .

[16]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[17]  Mattias Andersson,et al.  Coding for the Wiretap Channel , 2011 .

[18]  Gregory W. Wornell,et al.  Rateless Coding for Gaussian Channels , 2007, IEEE Transactions on Information Theory.

[19]  Yuval Kochman,et al.  Joint Unitary Triangularization for MIMO Networks , 2012, IEEE Transactions on Signal Processing.

[20]  Reinaldo A. Valenzuela,et al.  V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel , 1998, 1998 URSI International Symposium on Signals, Systems, and Electronics. Conference Proceedings (Cat. No.98EX167).

[21]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[22]  Rüdiger L. Urbanke,et al.  A rate-splitting approach to the Gaussian multiple-access channel , 1996, IEEE Trans. Inf. Theory.

[23]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[24]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[25]  Uri Erez,et al.  On the Robustness of Lattice Interference Alignment , 2013, IEEE Transactions on Information Theory.