On the Secrecy Capacity of the Z-Interference Channel

The two-user Z-interference channel with an additional secrecy constraint is considered. The two transmitterreceiver pairs wish to reliably transmit their messages; however the transmission of the first pair both interferes with the transmission of the second pair and is also required to be completely secure from the second receiver. The focus here is on the capacity region of the above Z-interference channel in the Gaussian case under the standard power constraints. The maximum rates of the two users in this setting are described, and although the maximum rate of the transmission of the first pair has a single-letter expression, due to Wyner’s secrecy capacity expression, its maximization is non-trivial. The significance of a stochastic encoder for the second transmitter, encoding a message which is not required to comply with any secrecy constraints, is noted. It is shown explicitly that constraining this encoder to be deterministic reduces the capacity region. Finally, a Satotype outer bound on the capacity region is obtained under this additional deterministic encoder constraint.

[1]  Lizhong Zheng,et al.  Coding along Hermite polynomials for interference channels , 2009, 2009 IEEE Information Theory Workshop.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Igal Sason On the Corner Points of the Capacity Region of a Gaussian Interference Channel , 2013, ArXiv.

[4]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[5]  Lizhong Zheng,et al.  A Coordinate System for Gaussian Networks , 2010, IEEE Transactions on Information Theory.

[6]  Shlomo Shamai,et al.  The effect of maximal rate codes on the interfering message rate , 2014, 2014 IEEE International Symposium on Information Theory.

[7]  Suhas N. Diggavi,et al.  The worst additive noise under a covariance constraint , 2001, IEEE Trans. Inf. Theory.

[8]  Max H. M. Costa,et al.  On the Gaussian interference channel , 1985, IEEE Trans. Inf. Theory.

[9]  Hiroshi Sato On degraded Gaussian two-user channels (Corresp.) , 1978, IEEE Trans. Inf. Theory.