The two-hop interference untrusted-relay channel with confidential messages

Ahmed A. Zewail, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)

    Abstract

    This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.

    Original languageEnglish (US)
    Title of host publicationITW 2015 - 2015 IEEE Information Theory Workshop
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages322-326
    Number of pages5
    ISBN (Electronic)9781467378529
    DOIs
    StatePublished - Dec 17 2015
    EventIEEE Information Theory Workshop, ITW 2015 - Jeju Island, Korea, Republic of
    Duration: Oct 11 2015Oct 15 2015

    Other

    OtherIEEE Information Theory Workshop, ITW 2015
    CountryKorea, Republic of
    CityJeju Island
    Period10/11/1510/15/15

    Fingerprint

    Jamming
    Cryptography
    Communication

    All Science Journal Classification (ASJC) codes

    • Information Systems

    Cite this

    Zewail, A. A., & Yener, A. (2015). The two-hop interference untrusted-relay channel with confidential messages. In ITW 2015 - 2015 IEEE Information Theory Workshop (pp. 322-326). [7360788] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ITWF.2015.7360788
    Zewail, Ahmed A. ; Yener, Aylin. / The two-hop interference untrusted-relay channel with confidential messages. ITW 2015 - 2015 IEEE Information Theory Workshop. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 322-326
    @inproceedings{2395e62fd7bd4a35a6b5beabcbcc99cc,
    title = "The two-hop interference untrusted-relay channel with confidential messages",
    abstract = "This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.",
    author = "Zewail, {Ahmed A.} and Aylin Yener",
    year = "2015",
    month = "12",
    day = "17",
    doi = "10.1109/ITWF.2015.7360788",
    language = "English (US)",
    pages = "322--326",
    booktitle = "ITW 2015 - 2015 IEEE Information Theory Workshop",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",
    address = "United States",

    }

    Zewail, AA & Yener, A 2015, The two-hop interference untrusted-relay channel with confidential messages. in ITW 2015 - 2015 IEEE Information Theory Workshop., 7360788, Institute of Electrical and Electronics Engineers Inc., pp. 322-326, IEEE Information Theory Workshop, ITW 2015, Jeju Island, Korea, Republic of, 10/11/15. https://doi.org/10.1109/ITWF.2015.7360788

    The two-hop interference untrusted-relay channel with confidential messages. / Zewail, Ahmed A.; Yener, Aylin.

    ITW 2015 - 2015 IEEE Information Theory Workshop. Institute of Electrical and Electronics Engineers Inc., 2015. p. 322-326 7360788.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    TY - GEN

    T1 - The two-hop interference untrusted-relay channel with confidential messages

    AU - Zewail, Ahmed A.

    AU - Yener, Aylin

    PY - 2015/12/17

    Y1 - 2015/12/17

    N2 - This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.

    AB - This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.

    UR - http://www.scopus.com/inward/record.url?scp=84962640362&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84962640362&partnerID=8YFLogxK

    U2 - 10.1109/ITWF.2015.7360788

    DO - 10.1109/ITWF.2015.7360788

    M3 - Conference contribution

    SP - 322

    EP - 326

    BT - ITW 2015 - 2015 IEEE Information Theory Workshop

    PB - Institute of Electrical and Electronics Engineers Inc.

    ER -

    Zewail AA, Yener A. The two-hop interference untrusted-relay channel with confidential messages. In ITW 2015 - 2015 IEEE Information Theory Workshop. Institute of Electrical and Electronics Engineers Inc. 2015. p. 322-326. 7360788 https://doi.org/10.1109/ITWF.2015.7360788