• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

具有外部窃听者和反馈的加性高斯白噪声多址接入信道的保密容量区域

Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback.

作者信息

Yuan Haoheng, Xie Guangfen, Dai Bin

机构信息

School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China.

Peng Cheng Laboratory, Shenzhen 518055, China.

出版信息

Entropy (Basel). 2023 Sep 15;25(9):1339. doi: 10.3390/e25091339.

DOI:10.3390/e25091339
PMID:37761639
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10527619/
Abstract

For the point-to-point additive white Gaussian noise (AWGN) channel with an eavesdropper and feedback, it has already been shown that the secrecy capacity can be achieved by a secret key-based feedback scheme, where the channel feedback is used for secret sharing, and then encrypting the transmitted message by the shared key. By secret sharing, any capacity-achieving coding scheme for the AWGN channel without feedback can be secure by itself, which indicates that the capacity of the same model without the secrecy constraint also affords an achievable secrecy rate to the AWGN channel with an eavesdropper and feedback. Then it is natural to ask: is the secret key-based feedback scheme still the optimal scheme for the AWGN multiple-access channel (MAC) with an external eavesdropper and channel feedback (AWGN-MAC-E-CF), namely, achieving the secrecy capacity region of the AWGN-MAC-E-CF? In this paper, we show that the answer to the aforementioned question is no, and propose the optimal feedback coding scheme for the AWGN-MAC-E-CF, which combines an existing linear feedback scheme for the AWGN MAC with feedback and the secret key scheme in the literature. This paper provides a way to find optimal coding schemes for AWGN multi-user channels in the presence of an external eavesdropper and channel feedback.

摘要

对于具有窃听者和反馈的点对点加性高斯白噪声(AWGN)信道,已经表明,通过基于密钥的反馈方案可以实现保密容量,其中信道反馈用于秘密共享,然后通过共享密钥对传输的消息进行加密。通过秘密共享,任何用于无反馈AWGN信道的达到容量的编码方案本身都可以是安全的,这表明没有保密约束的相同模型的容量也为具有窃听者和反馈的AWGN信道提供了一个可实现的保密速率。然后自然会问:基于密钥的反馈方案对于具有外部窃听者和信道反馈的AWGN多址接入信道(MAC)(AWGN-MAC-E-CF)仍然是最优方案吗,即实现AWGN-MAC-E-CF的保密容量区域?在本文中,我们表明上述问题的答案是否定的,并提出了AWGN-MAC-E-CF的最优反馈编码方案,该方案将现有的用于具有反馈的AWGN MAC的线性反馈方案与文献中的密钥方案相结合。本文提供了一种在存在外部窃听者和信道反馈的情况下为AWGN多用户信道找到最优编码方案的方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/2352ebf33e7a/entropy-25-01339-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/ba77fad2f867/entropy-25-01339-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/4e68df617ef1/entropy-25-01339-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/c37e379d405a/entropy-25-01339-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/5dce3b49f5c0/entropy-25-01339-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/2352ebf33e7a/entropy-25-01339-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/ba77fad2f867/entropy-25-01339-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/4e68df617ef1/entropy-25-01339-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/c37e379d405a/entropy-25-01339-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/5dce3b49f5c0/entropy-25-01339-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d27d/10527619/2352ebf33e7a/entropy-25-01339-g005.jpg

相似文献

1
Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback.具有外部窃听者和反馈的加性高斯白噪声多址接入信道的保密容量区域
Entropy (Basel). 2023 Sep 15;25(9):1339. doi: 10.3390/e25091339.
2
Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter.发射端具有非因果状态信息的依赖行动窃听信道的反馈方案
Entropy (Basel). 2019 Mar 13;21(3):278. doi: 10.3390/e21030278.
3
Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.存在干扰辅助窃听者情况下的高斯多用户窃听信道
Entropy (Basel). 2022 Nov 2;24(11):1595. doi: 10.3390/e24111595.
4
Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN.一类 WBAN 擦除窃听信道的保密容量。
Sensors (Basel). 2018 Nov 26;18(12):4135. doi: 10.3390/s18124135.
5
Feedback Approach for the Relay Channel with Noisy Feedback and Its Security Analysis.具有噪声反馈的中继信道的反馈方法及其安全性分析
Entropy (Basel). 2024 Jul 30;26(8):651. doi: 10.3390/e26080651.
6
On the Zero-Outage Secrecy-Capacity of Dependent Fading Wiretap Channels.关于相关衰落窃听信道的零中断保密容量
Entropy (Basel). 2022 Jan 8;24(1):99. doi: 10.3390/e24010099.
7
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel.关于依赖动作的脏纸窃听信道反馈容量的新结果。
Entropy (Basel). 2021 Jul 21;23(8):929. doi: 10.3390/e23080929.
8
Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel.物理层安全:多天线窃听信道的信道探测结果
Entropy (Basel). 2023 Sep 29;25(10):1397. doi: 10.3390/e25101397.
9
Secrecy Coding Analysis of Short-Packet Full-Duplex Transmissions with Joint Iterative Channel Estimation and Decoding Processes.具有联合迭代信道估计与解码过程的短包全双工传输的保密编码分析
Sensors (Basel). 2022 Jul 14;22(14):5257. doi: 10.3390/s22145257.
10
Polar Coding for Confidential Broadcasting.用于保密广播的极化编码
Entropy (Basel). 2020 Jan 27;22(2):149. doi: 10.3390/e22020149.