Learn More
Strong secrecy capacity of compound wiretap channels is studied. The known lower bounds for the secrecy capacity of compound finite-state memoryless channels under discrete alphabets are extended to arbitrary uncertainty sets and continuous alphabets under the strong secrecy criterion. The conditions under which these bounds are tight are given. Under the(More)
The classical wiretap channel models secure communication in the presence of a nonlegitimate wiretapper who has to be kept ignorant. Traditionally, the wiretapper is passive in the sense that he only tries to eavesdrop the communication using his received channel output. In this paper, more powerful active wiretappers are studied. In addition to(More)
In this work, we study the bidirectional broadcast channel with common and confidential messages and establish the capacity-equivocation and secrecy capacity regions. This problem is motivated by the concept of bidirectional relaying in a three-node network, where a relay node establishes a bidirectional communication between two other nodes using a(More)
It is becoming more important that next-generation wireless networks wisely integrate multiple services at the physical layer to increase spectral efficiency. In this article, physical layer service integration in wireless networks is considered, where senders not only transmit individual data to certain receivers but also integrate additional multicast or(More)
The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. The performance of such a system is usually characterized by its secrecy capacity which determines the maximum transmission rate of secure communication. In this paper, the issue of whether or not the(More)
The compound MIMO Gaussian wiretap channel is studied, where the channel to the legitimate receiver is known and the eavesdropper channel is not known to the transmitter but is known to have a bounded spectral norm (channel gain). The compound secrecy capacity is established without the de-gradedness assumption and the optimal signaling is identified: the(More)
We study secure communication in which two confidential messages are transmitted over a broadcast channel to two legitimate receivers, while keeping an eavesdropper ignorant. Each legitimate receiver is interested in decoding one confidential message, while having the other one as side information. In order to measure the secrecy of the communication, we(More)
—This paper considers a three-receiver broadcast channel with degraded message sets and message cognition. The model consists of a common message for all three receivers, a private common message for only two receivers and two additional private messages for these two receivers, such that each receiver is only interested in one message, while being fully(More)