The two-hop interference untrusted-relay channel with confidential messages

Ahmed A. Zewail, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations

    Abstract

    This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.

    Original languageEnglish (US)
    Title of host publicationITW 2015 - 2015 IEEE Information Theory Workshop
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages322-326
    Number of pages5
    ISBN (Electronic)9781467378529
    DOIs
    StatePublished - Dec 17 2015
    EventIEEE Information Theory Workshop, ITW 2015 - Jeju Island, Korea, Republic of
    Duration: Oct 11 2015Oct 15 2015

    Publication series

    NameITW 2015 - 2015 IEEE Information Theory Workshop

    Other

    OtherIEEE Information Theory Workshop, ITW 2015
    CountryKorea, Republic of
    CityJeju Island
    Period10/11/1510/15/15

    All Science Journal Classification (ASJC) codes

    • Information Systems

    Fingerprint Dive into the research topics of 'The two-hop interference untrusted-relay channel with confidential messages'. Together they form a unique fingerprint.

    Cite this