On message authentication channel capacity over a wiretap channel

D Chen, S Jiang, N Zhang, L Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, a novel message authentication model using the same key over wiretap
channel is proposed to achieve information-theoretic security. Specifically, in the proposed …

Secure degrees of freedom region of static and time-varying Gaussian MIMO interference channel

K Banawan, S Ulukus - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
We consider the two-user multiple-input multipleoutput (MIMO) interference channel with
confidential messages (ICCM). We determine the exact secure degrees of freedom (sdof) …

Capacity bounds on the downlink of symmetric, multi-relay, single-receiver C-RAN networks

S Saeedi Bidokhti, G Kramer, S Shamai - Entropy, 2017 - mdpi.com
The downlink of symmetric Cloud Radio Access Networks (C-RANs) with multiple relays and
a single receiver is studied. Lower and upper bounds are derived on the capacity. The lower …

On the Gaussian multiple access wiretap channel and the Gaussian wiretap channel with a helper: Achievable schemes and upper bounds

R Fritschek, G Wunder - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
We study deterministic approximations of the Gaussian two-user multiple access wiretap
channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These …

Converse results for the downlink multicell processing with finite backhaul capacity

T Yang, N Liu, W Kang, SS Shitz - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we study outer bounds on the capacity region of the downlink multicell
processing model with finite backhaul capacity for the simple case of two base stations and …

The wiretapped diamond-relay channel

SH Lee, A Khisti - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
In this paper, we study a diamond-relay channel where the source is connected to M relays
through orthogonal links and the relays transmit to the destination over a wireless multiple …

Unified interference engineering for wireless information secrecy

L Ruan, A Conti, MZ Win - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Wireless communications are highly susceptible to eavesdropping due to their inherent
broadcast nature. Recent works have proposed the use of interference for impeding the …

The Gaussian diamond-wiretap channel with conferencing relays

SH Lee, A Khisti - IEEE Communications Letters, 2016 - ieeexplore.ieee.org
In this letter, we consider the Gaussian diamond-wiretap channel with conferencing links
between relays for the following three cases: 1) both conferencing links are confidential; 2) …

The Gaussian diamond-wiretap channel with rate-limited relay cooperation

SH Lee, A Khisti - IEEE Communications Letters, 2016 - ieeexplore.ieee.org
In this letter, we establish the secure degrees-of-freedom of the Gaussian diamond-wiretap
channel with rate-limited relay cooperation, where the eavesdropper not only observes the …

On the secure degrees of freedom of two-way 2× 2× 2 MIMO interference channel

Y Fan, X Wang, X Liao - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We investigate the secure degrees of freedom (SDoF) for the two-way 2× 2× 2 MIMO
interference channel (IC) under three wiretap models, ie, the confidential messages (CM) …