Secrecy Rate Region of the Broadcast Channel with an Eavesdropper

@article{Bagherikaram2009SecrecyRR,
  title={Secrecy Rate Region of the Broadcast Channel with an Eavesdropper},
  author={Ghadamali Bagherikaram and Abolfazl Seyed Motahari and Amir K. Khandani},
  journal={CoRR},
  year={2009},
  volume={abs/0910.3658}
}
In this paper, we consider a scenario where a source node wish es to broadcast two confidential messages to two receivers, while a wire-tapper also receives the transmitted signal. T his model is motivated by wireless communications, where in div dual secure messages are broadcast over open media and can be rece iv d by any illegitimate receiver. The secrecy level is meas ured by the equivocation rate at the eavesdropper. We first study t he general (non-degraded) broadcast channel with an… CONTINUE READING
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

The individual secrecy capacity of the Gaussian SISO and degraded Gaussian MIMO multi-receiver wiretap channel

2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) • 2015
View 1 Excerpt

Joint and individual secrecy in broadcast channels with receiver side information

2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) • 2014
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 50 references

Broadcast channels with confidential messages

IEEE Trans. Information Theory • 1978
View 5 Excerpts
Highly Influenced

A Note on the Secrecy Capac ity of the Multi-antenna Wiretap Channel

T. Liu, S. Shamai Shitz
IEEE Trans. Inf. Theory • 2009

On the Secrecy Capacity of Fading Channels ”

L. Lai P. K. Gopala, H. El-Gamal
IEEE Trans . Inform . Theory • 2009

Secrecy capacity region of Gaussian broadcast channel

2009 43rd Annual Conference on Information Sciences and Systems • 2009

Secrecy capacity region of the Gaussian multi-receiver wiretap channel

2009 IEEE International Symposium on Information Theory • 2009
View 2 Excerpts

Shamai(Shitz), “A Vector Ge n ralization of Costa Entropy Power Inequality and Applica tions

R. Liu, T. Liu, S.H.V. Poor
Submitted toIEEE Trans. on Inf. Theory, • 2009
View 1 Excerpt

Broadcast confidential and public messages

2008 42nd Annual Conference on Information Sciences and Systems • 2008

Similar Papers

Loading similar papers…