The role of an untrusted relay in secret communication

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations

    Abstract

    We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. A class of relay channels with orthogonal components is considered and an upper bound on the secrecy rate is derived. For the class of relay channels in consideration, we prove the relay and the eavesdropper can be separated to obtain an "enhanced" channel in terms of secrecy capacity. We then consider two special cases of this channel model: (i) the Gaussian orthogonal relay channel, and (ii) the Gaussian Cover-Kim deterministic relay channel. For the former, the upper bound found is tighter than the previously known bound. For the latter, we show that the bound yields the secrecy capacity when the source-destination link is not worse than the source-relay link. This second case also provides the first example where secrecy capacity is achieved with compressand-forward at the relay.

    Original languageEnglish (US)
    Title of host publicationProceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008
    Pages2212-2216
    Number of pages5
    DOIs
    StatePublished - 2008
    Event2008 IEEE International Symposium on Information Theory, ISIT 2008 - Toronto, ON, Canada
    Duration: Jul 6 2008Jul 11 2008

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings
    ISSN (Print)2157-8101

    Other

    Other2008 IEEE International Symposium on Information Theory, ISIT 2008
    Country/TerritoryCanada
    CityToronto, ON
    Period7/6/087/11/08

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'The role of an untrusted relay in secret communication'. Together they form a unique fingerprint.

    Cite this