Rick Fritschek

Learn More
There has been major progress over the last decade in understanding the classical interference channel (IC). Recent key results show that constant bit gap capacity results can be obtained from linear deterministic models (LDMs). However, it is widely unrecognized that the time-invariant, frequency-flat cellular channel, which contains the IC as a special(More)
The MAC-BC duality of information theory and wireless communications is an intriguing concept for efficient algorithm design. However, no concept is known so far for the important cellular channel. To make progress on this front, we consider in this paper the linear deterministic cellular channel. In particular, we prove duality of a network with two(More)
The use of wireless channel reciprocity properties for secret key generation has been an attractive method for many wireless applications. Most of the available methods rely on some sort of pilot signalling from the transceiver. This reduces the intrinsic security of the generated key. In this paper we have introduced a novel key generation and exchange(More)
Recent investigations have shown that multi-user gain can be enabled in frequency-flat time-invariant single-antenna cellular networks, for example the interfering multiple access channel (IMAC). These investigations have shown gain beyond results through treating interference as noise (TIN) techniques in the weak interference regime, rendering TIN(More)
Recent investigations have shown that the sum secure degrees of freedom of the Gaussian wiretap channel with a helper is 1/2. The achievable scheme for this result is based on the real interference alignment approach. While providing a good way to show degrees of freedom results, this technique has the disadvantage of relying on the Khintchine-Groshev(More)
Recent investigations have shown sum capacity results within a constant bit-gap for several channel models, e.g. the two-user Gaussian interference channel (G-IC), k-user G-IC or the Gaussian X-channel. This has motivated investigations of interferencelimited multi-user channels, for example, the Gaussian interfering multiple access channel (G-IMAC).(More)
We study a deterministic approximation of the two-user multiple access wiretap channel. This approximation enables results beyond the recently shown 2 3 secure degrees of freedom (s.d.o.f.) for the Gaussian multiple access channel. While the s.d.o.f. were obtained by real interference alignment, our approach uses signal-scale alignment. We show an(More)
  • 1