The multiple access wiretap channel II with a noisy main channel

Mohamed Nafea, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations

    Abstract

    A two transmitter multiple access wiretap channel II (MAC-WT-II) with a discrete memoryless (DM) main channel is investigated. Two models for the wiretapper, who chooses a fixed-length subset of the channel uses and observes erasures outside this subset, are proposed. In the first model, in each position of the subset, the wiretapper noiselessly observes either the first or the second user's symbol, while in the second model, the wiretapper observes a noiseless superposition of the two symbols. Achievable strong secrecy rate regions for the two models are derived. The achievability is established by solving a dual secret key agreement problem in the source model. The secrecy of the keys in the dual source model is established by deriving a lemma which provides a doubly exponential convergence rate for the probability of the keys being uniform and independent from the wiretapper's observation. The results extend the recently examined WTC-II with a DM main channel to a multiple access setting.

    Original languageEnglish (US)
    Title of host publicationProceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages2983-2987
    Number of pages5
    ISBN (Electronic)9781509018062
    DOIs
    StatePublished - Aug 10 2016
    Event2016 IEEE International Symposium on Information Theory, ISIT 2016 - Barcelona, Spain
    Duration: Jul 10 2016Jul 15 2016

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings
    Volume2016-August
    ISSN (Print)2157-8095

    Other

    Other2016 IEEE International Symposium on Information Theory, ISIT 2016
    Country/TerritorySpain
    CityBarcelona
    Period7/10/167/15/16

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'The multiple access wiretap channel II with a noisy main channel'. Together they form a unique fingerprint.

    Cite this