TY - JOUR
T1 - Collective Secrecy over the K -Transmitter Multiple Access Channel
AU - Chen, Yanling
AU - Koyluoglu, O. Ozan
AU - Vinck, A. J.Han
N1 - Funding Information:
Manuscript received August 4, 2017; revised January 26, 2018 and March 5, 2018; accepted March 6, 2018. Date of publication March 21, 2018; date of current version May 1, 2018. This work was supported in part by DFG under grant CH 601/2-1 and in part by NSF under Award CNS-1748692. This paper was presented at the 2017 IEEE Information Theory Workshop, Kaohsiung, Taiwan, Nov. 2017 [1]. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Walid Saad. (Corresponding author: Yanling Chen.) Y. Chen and A. J. H. Vinck are with the Institute of Digital Signal Processing, University of Duisburg-Essen, 47057 Duisburg, Germany (e-mail: yanling.chen@uni-due.de; han.vinck@uni-due.de).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2018/9
Y1 - 2018/9
N2 - This paper studies the problem of secure communication over a K -transmitter multiple access channel (MAC) in the presence of an external eavesdropper, subject to a collective secrecy constraint (i.e., information leakage rate to an eavesdropper on a collection of messages that are from a pre-specified subset of the K transmitters, say \mathcal {S}\subseteq \mathcal {K}=\{1,2,\ldots, K\} , is made vanishing). Since secrecy is of concern only to transmitters \{i|i\in \mathcal {S}\} but not to transmitters \{i|i\in \mathcal {S}^{c}\} , where \mathcal {S}^{c}=\mathcal {K}\backslash \mathcal {S} , different transmission strategies could be employed at transmitters \{i|i\in \mathcal {S}^{c}\}. Consider the following two scenarios: 1) transmitters \{i|i\in \mathcal {S}^{c}\} use deterministic encoders (which are conventionally used for MAC without secrecy), competing for the channel resource (i.e., being competitive) and 2) transmitters \{i|i\in \mathcal {S}^{c}\} use stochastic encoders, helping to hide other transmitters' messages from the eavesdropper (i.e., being cooperative). As a result, we establish the respective \mathcal {S} -collective secrecy achievable rate regions and demonstrate the advantage of being cooperative theoretically and numerically. To this end, in addition to the standard techniques, our results build upon two techniques. The first is a generalization of Chia-El Gamal's lemma on entropy bound for a set of codewords given partial information. The second is to utilize a compact representation of a list of sets that, together with submodular properties of mutual information functions involved, leads to an efficient Fourier-Motzkin elimination. These two approaches allow us to derive achievable regions in this work, and could also be of independent interest in other context.
AB - This paper studies the problem of secure communication over a K -transmitter multiple access channel (MAC) in the presence of an external eavesdropper, subject to a collective secrecy constraint (i.e., information leakage rate to an eavesdropper on a collection of messages that are from a pre-specified subset of the K transmitters, say \mathcal {S}\subseteq \mathcal {K}=\{1,2,\ldots, K\} , is made vanishing). Since secrecy is of concern only to transmitters \{i|i\in \mathcal {S}\} but not to transmitters \{i|i\in \mathcal {S}^{c}\} , where \mathcal {S}^{c}=\mathcal {K}\backslash \mathcal {S} , different transmission strategies could be employed at transmitters \{i|i\in \mathcal {S}^{c}\}. Consider the following two scenarios: 1) transmitters \{i|i\in \mathcal {S}^{c}\} use deterministic encoders (which are conventionally used for MAC without secrecy), competing for the channel resource (i.e., being competitive) and 2) transmitters \{i|i\in \mathcal {S}^{c}\} use stochastic encoders, helping to hide other transmitters' messages from the eavesdropper (i.e., being cooperative). As a result, we establish the respective \mathcal {S} -collective secrecy achievable rate regions and demonstrate the advantage of being cooperative theoretically and numerically. To this end, in addition to the standard techniques, our results build upon two techniques. The first is a generalization of Chia-El Gamal's lemma on entropy bound for a set of codewords given partial information. The second is to utilize a compact representation of a list of sets that, together with submodular properties of mutual information functions involved, leads to an efficient Fourier-Motzkin elimination. These two approaches allow us to derive achievable regions in this work, and could also be of independent interest in other context.
KW - Fourier-Motzkin elimination
KW - Mulitiple access channel
KW - capacity region
KW - secrecy
KW - submodular function
UR - http://www.scopus.com/inward/record.url?scp=85044319033&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85044319033&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2018.2818067
DO - 10.1109/TIFS.2018.2818067
M3 - Article
AN - SCOPUS:85044319033
SN - 1556-6013
VL - 13
SP - 2279
EP - 2293
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 9
ER -