Abstract
We show strongly secret achievable rate regions for two different wiretap multiple-access channel coding problems. In the first problem, each encoder has a private message and both together have a common message to transmit. The encoders have entropy-limited access to common randomness. If no common randomness is available, then the achievable region derived here does not allow for the secret transmission of a common message. The second coding problem assumes that the encoders do not have a common message nor access to common randomness. However, they may have a conferencing link over which they may iteratively exchange rate-limited information. This can be used to form a common message and common randomness to reduce the second coding problem to the first one. We give the example of a channel where the achievable region equals zero without conferencing or common randomness and where conferencing establishes the possibility of secret message transmission. Both coding problems describe practically relevant networks which need to be secured against eavesdropping attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahlswede, R.: Elimination of correlation in random codes for arbitrarily varying channels. Z. Wahrscheinlichkeitstheorie verw. Gebiete 44, 159–175 (1978)
Ahlswede, R.: Coloring hypergraphs: A new approach to multi-user source coding—II. J. Comb. Inform. Syst. Sci. 5(3), 220–268 (1980)
Ahlswede, R.: Arbitrarily varying channels with states sequence known to the sender. IEEE Trans. Inf. Theory IT 32(5), 621–629 (1986)
Ahlswede, R.: On Concepts of Performance Parameters for Channels. In: Ahlswede, R., Bäumer, L., Cai, N., Aydinian, H., Blinovsky, V., Deppe, C., Mashurian, H. (eds.) Information Transfer and Combinatorics. LNCS, vol. 4123, pp. 639–663. Springer, Heidelberg (2006)
Ahlswede, R., Cai, N.: Arbitrarily varying multiple-access channels part I—Ericson’s symmetrizability is adequate, Gubner’s conjecture is true. IEEE Trans. Inf. Theory 45(2), 742–749 (1999)
Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryptography—part I: Secret sharing. IEEE Trans. Inf. Theory 39(4) (1993)
Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryptography—part II: CR capacity. IEEE Trans. Inf. Theory 44(1) (1998)
Ahlswede, R., Winter, A.: Strong converse for identification vie quantum channels. IEEE Trans. Inf. Theory 48(3), 569–579 (2002)
Ahlswede, R.: Multi-way communication channels. In: Proceedings of 2nd International Symposium on Information Theory, Tsahkadsor, Armenian SSR, Akadémiai Kiadó, Budapest, pp. 23–52 (1971)
Ahlswede, R.: An elementary proof of the strong converse theorem for the multiple-access channel. J. Comb. Inf. Syst. Sci. 7, 216–230 (1982)
Bjelaković, I., Boche, H., Sommerfeld, J.: Secrecy results for compound wiretap channels, http://arxiv.org/abs/1106.2013
Bloch, M.R., Laneman, J.N.: Secrecy from resolvability. Submitted to IEEE Trans. Inf. Theory (2011)
Cai, N., Winter, A., Yeung, R.W.: Quantum privacy and quantum wiretap channels. Problems of Information Transmission 40(4), 318–336 (2004)
Csiszár, I.: Almost independence and secrecy capacity. Problems of Information Transmission 32(1), 40–47 (1996)
Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory IT-24(3), 339–348 (1978)
Csiszár, I., Körner, J.: Information Theory: Coding Theorems for Discrete Memoryless Systems, 2nd edn. Cambridge University Press, Cambridge (2011)
Devetak, I.: The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inf. Theory 51(1), 44–55 (2005)
Dueck, G.: The strong converse of the coding theorem for the multiple-access channel. J. Comb. Inf. Syst. Sci. 6, 187–196 (1981)
Ekrem, E., Ulukus, S.: Effects of cooperation on the secrecy of multiple access channels with generalized feedback. In: Proc. Conf. on Inf. Sciences and Systems (CISS), Princeton, NJ, pp. 791–796 (2008)
Ekrem, E., Ulukus, S.: On the secrecy of multiple access wiretap channel. In: Proc. Allerton Conference, Allerton House, UIUC, IL, pp. 1014–1021 (2008)
He, X., Yener, A.: Mimo wiretap channel with arbitrarily varying eavesdropper channel states. Submitted to IEEE Trans. Inf. Theory (2010), http://arxiv.org/abs/1007.4801
Körner, J., Marton, K.: The comparison of two noisy channels. In: Csiszár, I., Elias, P. (eds.) Topics in Information Theory . Coll. Math. Soc. J. Bolyai, vol. 16. North Holland, Amsterdam (1977)
Liang, Y., Poor, H.V.: Multiple-access channels with confidential messages. IEEE Trans. Inf. Theory 54(3), 976–1002 (2008)
Liang, Y., Poor, H.V., Shamai, S.: Information theoretic security. Found. Trends Commun. Inf. Theory 5(4-5), 355–580 (2008)
Liao, H.J.: Multiple access channels. PhD thesis, Dept. of Electrical Engineering, University of Hawaii, Honolulu (1972)
Liu, R., Liang, Y., Poor, H.V.: Fading cognitive multiple-access channels with confidential messages. Submitted to IEEE Trans. Inf. Theory (2009), http://arxiv.org/abs/0910.4613
Liu, R., Marić, I., Yates, R., Spasojević, P.: The discrete memoryless multiple-access channel with confidential messages. In: Proc. Int. Symp. Inf. Theory, Seattle, pp. 957–961 (2006)
Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)
Maurer, U.M.: The strong secret key rate of discrete random triples. In: Blahut, R. (ed.) Communication and Cryptography — Two Sides of One Tapestry, pp. 271–285. Kluwer Academic Publishers (1994)
Pierrot, A.J., Bloch, M.R.: Strongly secure communications over the two-way wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3) (2011)
Simeone, O., Yener, A.: The cognitive multiple access wire-tap channel. In: Proc. Conf. on Inf. Sciences and Systems (CISS), Baltimore, NJ (2009)
Slepian, D., Wolf, K.: A coding theorem for multiple access channels with correlated sources. Bell Sytem Techn. J. 52(7), 1037–1076 (1973)
Tang, X., Liu, R., Spasojević, P., Poor, H.V.: Multiple acess channels with generalized feedback and confidential messages. In: Proc. Inf. Theory Workshop, Lake Tahoe, CA, pp. 608–613 (2007)
Tekin, E., Yener, A.: The gaussian multiple access wire-tap channel. IEEE Trans. Inf. Theory 54(12), 5747–5755 (2008)
van Dijk, M.: On a special class of broadcast channels with confidential messages. IEEE Trans. Inf. Theory 43(2), 712–714 (1997)
Wiese, M., Boche, H.: The arbitrarily varying multiple-access channel with conferencing encoders. Submitted to IEEE Trans. Inf. Theory (2011), http://arxiv.org/abs/1105.0319
Wiese, M., Boche, H., Bjelaković, I., Jungnickel, V.: The compound multiple access channel with partially cooperating encoders. IEEE Trans. Inf. Theory 57(5), 3045–3066 (2011)
Willems, F.M.J.: Informationtheoretical results for the discrete memoryless multiple access channel. PhD thesis, Katholieke Universiteit Leuven (1982)
Willems, F.M.J.: The discrete memoryless multiple access channel with partially cooperating encoders. IEEE Trans. Inf. Theory IT-29(3), 441–445 (1983)
Wyner, A.: The wire-tap channel. The Bell System Tech. J. 54(8), 1355–1387 (1975)
Wyrembelski, R.F., Wiese, M., Boche, H.: Strong secrecy in bidirectional relay networks. In: Proc. Asilomar Conference on Signals, Systems and Computers (ACSSC 2011), Pacific Grove, CA (2011)
Yassaee, M.H., Aref, M.R.: Multiple access wiretap channels with strong secrecy. In: Proc. IEEE Information Theoy Workshop (ITW 2010), Dublin (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Wiese, M., Boche, H. (2013). Strong Secrecy for Multiple Access Channels. In: Aydinian, H., Cicalese, F., Deppe, C. (eds) Information Theory, Combinatorics, and Search Theory. Lecture Notes in Computer Science, vol 7777. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36899-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-36899-8_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36898-1
Online ISBN: 978-3-642-36899-8
eBook Packages: Computer ScienceComputer Science (R0)