Deterministic multiple access wiretap channel
2010 (English)In: Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, IEEE , 2010, 998-1001 p.Conference paper (Refereed)
Two-user Multiple Access Channel with a Wire- Tapper (MAC-WT) is considered. A general outer bound for the secrecy capacity region is given. Also, we have defined the Deterministic MAC-WT, where the channel input of each user is a deterministic function of the channel output and the channel input of the other user. For this network single-letter inner and outer bounds for the secrecy capacity region are given. Furthermore, it is shown that in the Deterministic MAC-WT, if the wiretapper channel is a degraded version of the main channel, inner and outer bounds meet and the secrecy capacity region is characterized.
Place, publisher, year, edition, pages
IEEE , 2010. 998-1001 p.
Multiple access channel, Secrecy capacity
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-96781DOI: 10.1109/ICITIS.2010.5689656ScopusID: 2-s2.0-79951642676ISBN: 978-142446940-6OAI: oai:DiVA.org:kth-96781DiVA: diva2:532656
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010;Beijing;17 December 2010 through 19 December 2010
QC 201206212012-06-122012-06-122012-06-21Bibliographically approved