TY - GEN
T1 - New achievable secrecy rate regions for the two way wiretap channel
AU - El Gamal, Aly
AU - Koyluoglu, O. Ozan
AU - Youssef, Moustafa
AU - El Gamal, Hesham
PY - 2010
Y1 - 2010
N2 - This work develops new achievable rate regions for the two way wiretap channel. In our setup, Alice and Bob wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, our achievability argument relies on allowing the two users to jointly optimize their channel prefixing distributions, such that the new channel conditions are favorable compared to that of Eve. Random binning and private key sharing over the channel are then used to exploit the secrecy advantage available in the equivalent cascade channel and to distribute the available secrecy rate among users. For the half-duplex case, we introduce the idea of randomized scheduling and establish the significant gain it offers in terms of the achievable secrecy sum-rate. We also quantify the gains that can be leveraged from the proposed schemes in the modulo-2 and Gaussian channels via numerical results in certain selected scenarios.
AB - This work develops new achievable rate regions for the two way wiretap channel. In our setup, Alice and Bob wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full-duplex scenario, our achievability argument relies on allowing the two users to jointly optimize their channel prefixing distributions, such that the new channel conditions are favorable compared to that of Eve. Random binning and private key sharing over the channel are then used to exploit the secrecy advantage available in the equivalent cascade channel and to distribute the available secrecy rate among users. For the half-duplex case, we introduce the idea of randomized scheduling and establish the significant gain it offers in terms of the achievable secrecy sum-rate. We also quantify the gains that can be leveraged from the proposed schemes in the modulo-2 and Gaussian channels via numerical results in certain selected scenarios.
UR - http://www.scopus.com/inward/record.url?scp=77954826162&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954826162&partnerID=8YFLogxK
U2 - 10.1109/ITWKSPS.2010.5503136
DO - 10.1109/ITWKSPS.2010.5503136
M3 - Conference contribution
AN - SCOPUS:77954826162
SN - 9781424463725
T3 - IEEE Information Theory Workshop 2010, ITW 2010
BT - IEEE Information Theory Workshop 2010, ITW 2010
T2 - IEEE Information Theory Workshop 2010, ITW 2010
Y2 - 6 January 2010 through 8 January 2010
ER -