TY - GEN
T1 - The two-hop interference untrusted-relay channel with confidential messages
AU - Zewail, Ahmed A.
AU - Yener, Aylin
PY - 2015/12/17
Y1 - 2015/12/17
N2 - This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.
AB - This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.
UR - http://www.scopus.com/inward/record.url?scp=84962640362&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962640362&partnerID=8YFLogxK
U2 - 10.1109/ITWF.2015.7360788
DO - 10.1109/ITWF.2015.7360788
M3 - Conference contribution
AN - SCOPUS:84962640362
T3 - ITW 2015 - 2015 IEEE Information Theory Workshop
SP - 322
EP - 326
BT - ITW 2015 - 2015 IEEE Information Theory Workshop
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - IEEE Information Theory Workshop, ITW 2015
Y2 - 11 October 2015 through 15 October 2015
ER -