Abstract

In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side information) or causal manner (termed here causal side information). Inner and outer bounds are derived on the capacity-equivocation regions for the noncausal and causal manners, and the secrecy capacities for both manners are described and bounded, which provide the best transmission rate with perfect secrecy. Moreover, for the case that the side information is available at the transmitter in a memoryless manner (termed here memoryless side information), both the capacity-equivocation region and the secrecy capacity are determined. The results of this paper extend the previous work on wiretap channel with noncausal side information by providing an outer bound on the capacity-equivocation region. In addition, we find that the memoryless side information can not help to obtain the same secrecy capacity as that of the causal case, and this is different from the well known fact that the memoryless manner can achieve the capacity of the channel with causal side information.

Highlights

  • Some New Results on the Wiretap Channel withComputer Science and Engineering Department, Shanghai Jiao Tong University, Dongchuan road

  • The concept of the wiretap channel was first introduced by A.D

  • Inner and outer bounds are derived on the capacity-equivocation regions for the noncausal and causal manners, and the secrecy capacity for both manners is described and bounded

Read more

Summary

Some New Results on the Wiretap Channel with

Computer Science and Engineering Department, Shanghai Jiao Tong University, Dongchuan road. Received: 17 July 2012; in revised form: 20 August 2012 / Accepted: 30 August 2012 /

Introduction
The Model of Figure 2 with Noncausal Side Information
The Model of Figure 2 with Causal Side Information
The Model of Figure 2 with Memoryless Side Information
Proof of Theorem 2
Proof of Theorem 4
Converse Half of Theorem 5
Coding Construction
Proof of
Proof of the Direct Half of Theorem 5
Code Construction
Proofs of
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call