Secure Communications with Limited Common Randomness at Transmitters

In this work we consider common randomness-aided secure communications, where a limited common randomness is available at the transmitters. Specifically, we focus on a two-user interference channel with secrecy constraints and a wiretap channel with a helper, in the presence of a limited common randomness shared between the transmitters. For both settings, we characterize the optimal secure sum degrees-of-freedom (DoF) or secure DoF as a function of the DoF of common randomness. The results reveal that the secure sum DoF or secure DoF increases as the DoF of common randomness increases, bridging the gap between the extreme DoF point without common randomness and the other extreme DoF point with unlimited common randomness. The proposed scheme is a two-layer coding scheme, in which two sub-schemes are designed in two layers respectively, i.e., at two different power levels, utilizing common randomness in the first layer only. The role of common randomness is to jam partial information signal at the eavesdroppers, without causing interference at the legitimate receivers. To prove the optimality of the proposed scheme, a new converse is also derived in this work.

[1]  Aylin Yener,et al.  Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[2]  Jinyuan Chen New results on the secure capacity of symmetric two-user interference channels , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Fan Li,et al.  Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel , 2019, IEEE Transactions on Information Forensics and Security.

[4]  Roy D. Yates,et al.  Secret communication on interference channels , 2008, 2008 IEEE International Symposium on Information Theory.

[5]  Chandra R. Murthy,et al.  Outer bounds on the secrecy rate of the 2-user symmetric deterministic interference channel with transmitter cooperation , 2014, 2014 Twentieth National Conference on Communications (NCC).

[6]  Aylin Yener,et al.  Interference channels with strong secrecy , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[7]  H. Vincent Poor,et al.  Fading Cognitive Multiple-Access Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[8]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[9]  Aylin Yener,et al.  MIMO multiple access channel with an arbitrarily varying eavesdropper , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[10]  Pritam Mukherjee,et al.  Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT , 2014, IEEE Transactions on Information Theory.

[11]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[12]  Aylin Yener,et al.  Degrees of freedom of the single antenna gaussian wiretap channel with a helper irrespective of the number of antennas at the eavesdropper , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  Jinyuan Chen Secure Communication over Interference Channel: To Jam or Not to Jam? , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[15]  Shlomo Shamai,et al.  Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.

[16]  Suhas Diggavi,et al.  On noise insertion strategies for wireless network secrecy , 2009, 2009 Information Theory and Applications Workshop.

[17]  Syed Ali Jafar,et al.  On the Optimality of Treating Interference as Noise , 2015, IEEE Transactions on Information Theory.

[18]  Ming Xiao,et al.  Strong Secrecy for Interference Channels Based on Channel Resolvability , 2018, IEEE Transactions on Information Theory.

[19]  Roy D. Yates,et al.  Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.

[20]  Aylin Yener,et al.  A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[21]  Fan Li,et al.  How to Break the Limits of Secrecy Constraints in Communication Networks? , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[22]  Ashish Khisti,et al.  The Wiretapped Diamond-Relay Channel , 2016, IEEE Transactions on Information Theory.

[23]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[24]  Fan Li,et al.  Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks , 2019, ArXiv.

[25]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[26]  Chandra R. Murthy,et al.  On the Capacity of the Two-User Symmetric Interference Channel With Transmitter Cooperation and Secrecy Constraints , 2016, IEEE Transactions on Information Theory.

[27]  Syed Ali Jafar,et al.  Secure GDoF of $K$-User Gaussian Interference Channels: When Secrecy Incurs No Penalty , 2015, IEEE Communications Letters.

[28]  Jin Xu,et al.  Capacity Bounds for Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[29]  Syed Ali Jafar,et al.  On the Symmetric 2-User Deterministic Interference Channel with Confidential Messages , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[30]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[31]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[32]  Amir K. Khandani,et al.  On the Secure Degrees-of-Freedom of the Multiple-Access-Channel , 2010, ArXiv.

[33]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[34]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[35]  Amir K. Khandani,et al.  The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.

[36]  Sanjay Karmakar,et al.  Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1/2 bits , 2015, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT).

[37]  Shlomo Shamai,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[38]  Abbas El Gamal,et al.  Three-Receiver Broadcast Channels With Common and Confidential Messages , 2012, IEEE Transactions on Information Theory.

[39]  Gerhard Wunder,et al.  On Multiuser Gain and the Constant-Gap Sum Capacity of the Gaussian Interfering Multiple Access Channel , 2017, ArXiv.

[40]  Aylin Yener,et al.  The Gaussian Many-to-One Interference Channel With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[41]  Chunhua Geng,et al.  Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[42]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[43]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[44]  Jianwei Xie,et al.  Secure degrees of freedom of the Gaussian wiretap channel with helpers , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[45]  Jianwei Xie,et al.  Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.