On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys

Aditya Sinha, Parthajit Mohapatra, Jemin Lee, Tony Q.S. Quek

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper considers the problem of secure communication over a 2-user Gaussian interference channel (GIC) with shared key of finite rate between the transmitter-receiver pair with strong secrecy constraint at the receiver. The main contributions of the paper lies in obtaining a novel achievable scheme which uses a combination of one-time pad, stochastic encoding and superposition based coding scheme, and outer bound on the secrecy capacity region of the 2-user GIC. The main novelty of the derivation of the outer bound lies in the selection of the side-information to be provided to the receiver and using the secrecy constraints at the receiver. The results highlight the role of secret key in the encoding of messages to enhance the system performance in interference limited scenarios.

Original languageEnglish
Title of host publicationProceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages663-667
Number of pages5
ISBN (Electronic)9784885523182
DOIs
Publication statusPublished - 2019 Mar 8
Event15th International Symposium on Information Theory and Its Applications, ISITA 2018 - Singapore, Singapore
Duration: 2018 Oct 282018 Oct 31

Publication series

NameProceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018

Conference

Conference15th International Symposium on Information Theory and Its Applications, ISITA 2018
Country/TerritorySingapore
CitySingapore
Period18-10-2818-10-31

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys'. Together they form a unique fingerprint.

Cite this