Wiretap channel II with a noisy main channel

Mohamed Nafea, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations

    Abstract

    In this paper, a wiretap channel where the transmitter and receiver communicate through a discrete memoryless channel, and the eavesdropper (Eve) has perfect access to a fixed fraction of transmitted symbols (of its choosing) is considered. An outer bound for the rate-equivocation region of the channel, for all such fractions, is derived. An achievable scheme, which provides an inner bound for the rate-equivocation region, is proposed. The achievability is established by defining a class of good codebooks for which there exists a good partition that achieves the required level of equivocation no matter what subset of symbols Eve chooses. It is shown that, for a uniform input distribution, the probability of this class of good codes approaches 1 as the block length increases. This generalizes the wiretap II model to one with a noisy main channel.

    Original languageEnglish (US)
    Title of host publicationProceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages1159-1163
    Number of pages5
    ISBN (Electronic)9781467377041
    DOIs
    StatePublished - Sep 28 2015
    EventIEEE International Symposium on Information Theory, ISIT 2015 - Hong Kong, Hong Kong
    Duration: Jun 14 2015Jun 19 2015

    Publication series

    NameIEEE International Symposium on Information Theory - Proceedings
    Volume2015-June
    ISSN (Print)2157-8095

    Other

    OtherIEEE International Symposium on Information Theory, ISIT 2015
    Country/TerritoryHong Kong
    CityHong Kong
    Period6/14/156/19/15

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Information Systems
    • Modeling and Simulation
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Wiretap channel II with a noisy main channel'. Together they form a unique fingerprint.

    Cite this