How to Break the Limits of Secrecy Constraints in Communication Networks?

In many communication networks, secrecy constraints usually incur an extra limit in capacity (or generalized degrees-of-freedom, GDoF), in the sense that a penalty in capacity (or GDoF) is incurred due to the secrecy constraints. Over the past decades a significant amount of effort has been made by the researchers to understand the limits of secrecy constraints in communication networks. In this work, we focus on how to break the limits of secrecy constraints in communication networks, i.e., how to remove the penalty in GDoF due to the secrecy constraints. We begin with three basic settings: a two-user symmetric Gaussian interference channel with confidential messages, a symmetric Gaussian wiretap channel with a helper, and a two-user symmetric Gaussian multiple access wiretap channel. Interestingly, in this work we show that adding common randomness at the transmitters can totally remove the penalty in sum GDoF or GDoF region of the three settings considered here. The results reveal that adding common randomness at the transmitters is a powerful way to break the limits of secrecy constraints in communication networks. Common randomness can be generated offline. The role of the common randomness is to jam the information signal at the eavesdroppers, without causing too much interference at the legitimate receivers. To accomplish this role, a new method of Markov chain-based interference neutralization is proposed in the achievability schemes utilizing common randomness. From the practical point of view, we hope to use less common randomness to break the limits of secrecy constraints. With this motivation, for most of the cases we characterize the minimal GDoF of common randomness to break the limits of secrecy constraints, based on our derived converses.

[1]  Hua Wang,et al.  Gaussian Interference Channel Capacity to Within One Bit , 2007, IEEE Transactions on Information Theory.

[2]  Ulukus Sennur,et al.  MIMO one hop networks with no eve CSIT , 2016 .

[3]  Chunhua Geng,et al.  Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).

[4]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[5]  Fan Li,et al.  Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks , 2019, ArXiv.

[6]  Sanjay Karmakar,et al.  Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1/2 bits , 2015, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT).

[7]  H. Vincent Poor,et al.  Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  Panagiotis Papadimitratos,et al.  Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  Jinyuan Chen Secure Communication over Interference Channel: To Jam or Not to Jam? , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[12]  Shlomo Shamai,et al.  Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.

[13]  Syed Ali Jafar,et al.  On the Symmetric 2-User Deterministic Interference Channel with Confidential Messages , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[14]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[15]  Chandra R. Murthy,et al.  On the Capacity of the Two-User Symmetric Interference Channel With Transmitter Cooperation and Secrecy Constraints , 2016, IEEE Transactions on Information Theory.

[16]  Fan Li,et al.  Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel , 2019, IEEE Transactions on Information Forensics and Security.

[17]  Jianwei Xie,et al.  Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.

[18]  Aylin Yener,et al.  MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom , 2013, IEEE Trans. Inf. Theory.