Abstract
This paper studies the problem of secure communication over broadcast channels under the individual secrecy constraints. That is, the transmitter wants to send two independent messages to two legitimate receivers in the presence of an eavesdropper, while keeping the eavesdropper ignorant of each message. A general achievable rate region is established by utilizing Marton's coding together with techniques such as rate splitting, Carleial-Hellman's secrecy coding, Wyner's secrecy coding and indirect decoding. Moreover, the individual secrecy capacity regions for some special cases are characterized, and an linear deterministic instance is exhibited to provide insights into the capacity regions under different secrecy constraints.
Original language | English (US) |
---|---|
Title of host publication | Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 611-615 |
Number of pages | 5 |
ISBN (Electronic) | 9784885523090 |
State | Published - Feb 2 2017 |
Event | 3rd International Symposium on Information Theory and Its Applications, ISITA 2016 - Monterey, United States Duration: Oct 30 2016 → Nov 2 2016 |
Other
Other | 3rd International Symposium on Information Theory and Its Applications, ISITA 2016 |
---|---|
Country | United States |
City | Monterey |
Period | 10/30/16 → 11/2/16 |
ASJC Scopus subject areas
- Computer Networks and Communications
- Hardware and Architecture
- Information Systems
- Signal Processing
- Library and Information Sciences