{"title":"A New Achievable Region of the K-User MAC Wiretap Channel With Confidential and Open Messages Under Strong Secrecy","authors":"Hao Xu;Kai-Kit Wong;Giuseppe Caire","doi":"10.1109/TIT.2024.3471662","DOIUrl":null,"url":null,"abstract":"This paper investigates the achievable region of a K-user discrete memoryless (DM) multiple access wiretap (MAC-WT) channel, where each user transmits both secret and open (i.e., non-confidential) messages. All these messages are intended for the legitimate receiver (Bob), while the eavesdropper (Eve) is only interested in the secret messages. In the achievable coding strategy, the confidential information is protected by open messages and also by the introduction of auxiliary messages. When introducing an auxiliary message, one has to ensure that, on one hand, its rate is large enough for protecting the secret message from Eve and, on the other hand, the resulting sum rate (together with the secret and open message rate) does not exceed Bob’s decoding capability. This yields an inequality structure involving the rates of all users’ secret, open, and auxiliary messages. To obtain the rate region, the auxiliary message rates must be eliminated from the system of inequalities. A direct application of the Fourier-Motzkin elimination procedure is elusive since a) it requires that the number of users K is explicitly given, and b) even for small \n<inline-formula> <tex-math>$K = 3, 4, \\ldots $ </tex-math></inline-formula>\n, the number of inequalities becomes extremely large. We prove the result for general K through the combined use of Fourier-Motzkin elimination procedure and mathematical induction. This paper adopts the strong secrecy metric, characterized by information leakage. To prove the achievability under this criterion, we analyze the resolvability region of a K-user DM-MAC channel (not necessarily a wiretap channel). In addition, we show that users with zero secrecy rate can play different roles and use different strategies in encoding their messages. These strategies yield non-redundant (i.e., not mutually dominating) rate inequalities. By considering all possible coding strategies, we provide a new achievable region for the considered channel, and show that it strictly improves those already known in the existing literature by considering a specific example.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 12","pages":"9123-9151"},"PeriodicalIF":2.2000,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Theory","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10701467/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper investigates the achievable region of a K-user discrete memoryless (DM) multiple access wiretap (MAC-WT) channel, where each user transmits both secret and open (i.e., non-confidential) messages. All these messages are intended for the legitimate receiver (Bob), while the eavesdropper (Eve) is only interested in the secret messages. In the achievable coding strategy, the confidential information is protected by open messages and also by the introduction of auxiliary messages. When introducing an auxiliary message, one has to ensure that, on one hand, its rate is large enough for protecting the secret message from Eve and, on the other hand, the resulting sum rate (together with the secret and open message rate) does not exceed Bob’s decoding capability. This yields an inequality structure involving the rates of all users’ secret, open, and auxiliary messages. To obtain the rate region, the auxiliary message rates must be eliminated from the system of inequalities. A direct application of the Fourier-Motzkin elimination procedure is elusive since a) it requires that the number of users K is explicitly given, and b) even for small
$K = 3, 4, \ldots $
, the number of inequalities becomes extremely large. We prove the result for general K through the combined use of Fourier-Motzkin elimination procedure and mathematical induction. This paper adopts the strong secrecy metric, characterized by information leakage. To prove the achievability under this criterion, we analyze the resolvability region of a K-user DM-MAC channel (not necessarily a wiretap channel). In addition, we show that users with zero secrecy rate can play different roles and use different strategies in encoding their messages. These strategies yield non-redundant (i.e., not mutually dominating) rate inequalities. By considering all possible coding strategies, we provide a new achievable region for the considered channel, and show that it strictly improves those already known in the existing literature by considering a specific example.
本文研究了 K 用户离散无记忆(DM)多路接入窃听(MAC-WT)信道的可实现区域,其中每个用户都传输秘密和公开(即非机密)信息。所有这些信息都是为合法接收者(Bob)准备的,而窃听者(Eve)只对秘密信息感兴趣。在可实现的编码策略中,机密信息受到公开信息和辅助信息的保护。在引入辅助信息时,一方面必须确保其速率足够大,以保护密文不被夏娃窃取;另一方面,由此产生的总速率(加上密文和公开信息的速率)不会超过鲍勃的解码能力。这就产生了一个涉及所有用户的密文、公开信息和辅助信息速率的不等式结构。要获得速率区域,必须从不等式系统中消除辅助信息速率。傅立叶-莫兹金消除过程的直接应用是难以捉摸的,因为 a) 它要求明确给出用户数量 K;b) 即使对于较小的 $K = 3, 4, \ldots $,不等式的数量也会变得非常大。我们结合使用傅立叶-莫兹金消除过程和数学归纳法,证明了一般 K 的结果。本文采用以信息泄露为特征的强保密度量。为了证明该准则下的可实现性,我们分析了 K 用户 DM-MAC 信道(不一定是窃听信道)的可解析区域。此外,我们还证明了保密率为零的用户可以扮演不同的角色,并在编码信息时使用不同的策略。这些策略会产生非冗余(即互不支配)的速率不等式。通过考虑所有可能的编码策略,我们为所考虑的信道提供了一个新的可实现区域,并通过考虑一个具体例子证明它严格改进了现有文献中已知的可实现区域。
期刊介绍:
The IEEE Transactions on Information Theory is a journal that publishes theoretical and experimental papers concerned with the transmission, processing, and utilization of information. The boundaries of acceptable subject matter are intentionally not sharply delimited. Rather, it is hoped that as the focus of research activity changes, a flexible policy will permit this Transactions to follow suit. Current appropriate topics are best reflected by recent Tables of Contents; they are summarized in the titles of editorial areas that appear on the inside front cover.