The Gaussian Many-to-One Interference Channel With Confidential Messages
The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K -user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one inte...
Saved in:
Published in | IEEE transactions on information theory Vol. 57; no. 5; pp. 2730 - 2745 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.05.2011
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 0018-9448 1557-9654 |
DOI | 10.1109/TIT.2011.2119650 |
Cover
Abstract | The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K -user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subject to interference, is also one from which the interfering users' messages need to be kept secret from. We derive the achievable secrecy sum rate for this channel using nested lattice codes, as well as an upper bound on the secrecy sum rate for all possible channel gain configurations. We identify several nontrivial cases where the gap between the upper bound and the achieved secrecy sum rate is only a function of the number of the users K , and is uniform over all possible channel gain configurations in each case. In addition, we identify the secure degrees of freedom for this channel and show it to be equivalent to its degrees of freedom, i.e., the secrecy in high SNR comes for free. |
---|---|
AbstractList | The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K -user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subject to interference, is also one from which the interfering users' messages need to be kept secret from. We derive the achievable secrecy sum rate for this channel using nested lattice codes, as well as an upper bound on the secrecy sum rate for all possible channel gain configurations. We identify several nontrivial cases where the gap between the upper bound and the achieved secrecy sum rate is only a function of the number of the users K , and is uniform over all possible channel gain configurations in each case. In addition, we identify the secure degrees of freedom for this channel and show it to be equivalent to its degrees of freedom, i.e., the secrecy in high SNR comes for free. The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general $K$-user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subject to interference, is also one from which the interfering users' messages need to be kept secret from. We derive the achievable secrecy sum rate for this channel using nested lattice codes, as well as an upper bound on the secrecy sum rate for all possible channel gain configurations. We identify several nontrivial cases where the gap between the upper bound and the achieved secrecy sum rate is only a function of the number of the users $K$, and is uniform over all possible channel gain configurations in each case. In addition, we identify the secure degrees of freedom for this channel and show it to be equivalent to its degrees of freedom, i.e., the secrecy in high SNR comes for free. [PUBLICATION ABSTRACT] |
Author | Yener, A Xiang He |
Author_xml | – sequence: 1 surname: Xiang He fullname: Xiang He email: xxh119@psu.edu organization: Dept. of Electr. Eng., Pennsylvania State Univ., University Park, PA, USA – sequence: 2 givenname: A surname: Yener fullname: Yener, A email: yener@ee.psu.edu organization: Dept. of Electr. Eng., Pennsylvania State Univ., University Park, PA, USA |
BookMark | eNp9kEFPAjEQRhujiYjeTbxsvHhabLvtdns0RIEEwgXjsRmWWSlZutiWA__eEogHDp46nbxvMvPuyLXrHBLyyOiAMapfF5PFgFPGBpwxXUp6RXpMSpWnWlyTHqWsyrUQ1S25C2GTvkIy3iPjxRqzEexDsOCyGbhDHrt87jCbuIi-QY-uxmy4Buewzb5sXGfDzjV2hS5aaLMZhgDfGO7JTQNtwIfz2yefH--L4TifzkeT4ds0rwvOYy40iiWCViih0lRAIehqpVclKM6qgimg2DAlRMFV3ZRCCqlhqUuugSOmdp-8nObufPezxxDN1oYa2xYcdvtgKiVppTSViXy-IDfd3ru0nKnKQrBSMJ2g8gTVvgvBY2NqGyHazkUPtjWMmqNek_Sao15z1puC9CK483YL_vBf5OkUsYj4h0sleTqz-AVMsIVi |
CODEN | IETTAW |
CitedBy_id | crossref_primary_10_1109_JPROC_2015_2445914 crossref_primary_10_1109_TIT_2019_2908832 crossref_primary_10_1155_2013_546260 crossref_primary_10_1007_s11432_014_5098_4 crossref_primary_10_1109_JPROC_2015_2459592 crossref_primary_10_1109_TIT_2014_2343226 crossref_primary_10_1109_TIT_2024_3460472 crossref_primary_10_1109_TIT_2017_2663427 crossref_primary_10_1109_TIFS_2018_2866327 crossref_primary_10_1016_j_phycom_2022_101791 crossref_primary_10_1109_JSAC_2018_2825560 crossref_primary_10_1002_ett_2816 crossref_primary_10_1109_LCOMM_2015_2435733 crossref_primary_10_1109_JSAIT_2021_3062755 crossref_primary_10_1109_TIT_2019_2961099 crossref_primary_10_1109_TIT_2016_2593624 crossref_primary_10_1109_TIT_2021_3137151 crossref_primary_10_1109_TWC_2015_2412531 crossref_primary_10_1109_TIT_2012_2216952 crossref_primary_10_1109_TIT_2017_2786541 |
Cites_doi | 10.1109/ALLERTON.2008.4797604 10.1109/TIT.1978.1055917 10.1109/TIT.2007.899484 10.1109/TIT.2008.921879 10.1109/ISIT.2009.5206054 10.1109/TIT.2005.855591 10.1109/TIT.2010.2054590 10.1109/TIT.2009.2021380 10.1109/TIT.2008.921680 10.1023/A:1007636609202 10.1109/TIT.2011.2132430 10.1109/TIT.2008.928267 10.1109/18.641543 10.1109/ITW.2007.4313092 10.1109/ALLERTON.2009.5394842 10.1109/ITW.2008.4578643 10.1109/TIT.2004.834787 10.1109/TIT.2012.2216952 10.1002/j.1538-7305.1949.tb00928.x 10.1109/CISS.2009.5054738 10.1002/j.1538-7305.1975.tb02040.x 10.1109/ALLERTON.2008.4797670 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2011 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2011 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
DOI | 10.1109/TIT.2011.2119650 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1557-9654 |
EndPage | 2745 |
ExternalDocumentID | 2329634021 10_1109_TIT_2011_2119650 5752454 |
Genre | orig-research Feature |
GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYOK AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
ID | FETCH-LOGICAL-c322t-49e4bea97e5a8904a340dd9d6a7218317a0ef1744327cf645459ab9629a2ee443 |
IEDL.DBID | RIE |
ISSN | 0018-9448 |
IngestDate | Thu Sep 04 21:39:14 EDT 2025 Mon Jun 30 03:10:07 EDT 2025 Thu Apr 24 22:57:03 EDT 2025 Tue Jul 01 02:34:28 EDT 2025 Tue Aug 26 17:17:01 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c322t-49e4bea97e5a8904a340dd9d6a7218317a0ef1744327cf645459ab9629a2ee443 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
PQID | 863416419 |
PQPubID | 36024 |
PageCount | 16 |
ParticipantIDs | proquest_miscellaneous_875087905 ieee_primary_5752454 crossref_primary_10_1109_TIT_2011_2119650 crossref_citationtrail_10_1109_TIT_2011_2119650 proquest_journals_863416419 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2011-May 2011-5-00 20110501 |
PublicationDateYYYYMMDD | 2011-05-01 |
PublicationDate_xml | – month: 05 year: 2011 text: 2011-May |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on information theory |
PublicationTitleAbbrev | TIT |
PublicationYear | 2011 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref15 ref14 ref10 he (ref13) 2009 ref2 ref1 ref17 ref16 yates (ref9) 2008 ref19 ref18 he (ref11) 0 li (ref7) 2008 ref24 ref23 ref25 ref20 ref22 ref21 ref8 koyluoglu (ref12) 0 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref18 doi: 10.1109/ALLERTON.2008.4797604 – ident: ref4 doi: 10.1109/TIT.1978.1055917 – ident: ref24 doi: 10.1109/TIT.2007.899484 – ident: ref5 doi: 10.1109/TIT.2008.921879 – ident: ref3 doi: 10.1109/ISIT.2009.5206054 – ident: ref22 doi: 10.1109/TIT.2005.855591 – ident: ref15 doi: 10.1109/TIT.2010.2054590 – ident: ref20 doi: 10.1109/TIT.2009.2021380 – ident: ref23 doi: 10.1109/TIT.2008.921680 – year: 0 ident: ref11 article-title: Providing Secrecy with structured codes: Tools and applications to gaussian two-user channels publication-title: IEEE Trans Inf Theory doi: 10.1023/A:1007636609202 – ident: ref14 doi: 10.1109/TIT.2011.2132430 – year: 2008 ident: ref7 article-title: Secrecy capacity region of a class of one-sided interference channel publication-title: IEEE Int Symp Information Theory doi: 10.1109/TIT.2008.928267 – ident: ref17 doi: 10.1109/18.641543 – ident: ref21 doi: 10.1109/ITW.2007.4313092 – year: 2009 ident: ref13 article-title: <formula formulatype="inline"><tex Notation="TeX">$K$</tex> </formula>-user interference channels: Achievable secrecy rate and degrees of freedom publication-title: IEEE Information Theory Workshop – ident: ref16 doi: 10.1109/ALLERTON.2009.5394842 – ident: ref6 doi: 10.1109/ITW.2008.4578643 – year: 2008 ident: ref9 article-title: Secure communication on interference channels publication-title: IEEE Int Symp Information Theory – ident: ref19 doi: 10.1109/TIT.2004.834787 – ident: ref25 doi: 10.1109/TIT.2012.2216952 – year: 0 ident: ref12 article-title: Cooperative binning and channel prefixing for secrecy in interference channels publication-title: IEEE Trans Inf Theory – ident: ref1 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref10 doi: 10.1109/CISS.2009.5054738 – ident: ref2 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref8 doi: 10.1109/ALLERTON.2008.4797670 |
SSID | ssj0014512 |
Score | 2.1676714 |
Snippet | The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2730 |
SubjectTerms | Channel models Channels Codes Communication channels Communications networks Degrees of freedom Electric noise Gain Gaussian Information theoretic secrecy Information theory Interference interference channel Interference channels lattice code Lattices Mathematical analysis Messages Receivers Transmitters Upper bound Upper bounds |
Title | The Gaussian Many-to-One Interference Channel With Confidential Messages |
URI | https://ieeexplore.ieee.org/document/5752454 https://www.proquest.com/docview/863416419 https://www.proquest.com/docview/875087905 |
Volume | 57 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLaAExx4I8ZLOXBBIqNd3Ww5IgQMpMFlCG5VmrmAQB1i7YVfj5M-hAAhblWbtlFsJ3ac7zPAoY2swSxGGUwmkUQVhZLXcZLsWWSsPlGcefjY6EYN7_D6IX6Yg-MWC0NE_vAZdd2lz-VPprZ0W2UcvMc9jHEe5lnNKqxWmzHAOKyYwUM2YI45mpRkoE_GV-OKq9OxmSmHsP-yBPmaKj8mYr-6XKzAqOlXdajkpVsWadd-fKNs_G_HV2G5djPFaaUXazBH-TqsNCUcRG3R67D0hY9wA4asNOLSlDOHrBQjnidkMZW3OQm_cVhDA4VDJOT0Ku6fiyfhIIPPHu3L_xu5giqPNNuEu4vz8dlQ1qUWpGWLLiRqwpSM7lNsBjpAEyELT0-U6TsfKuybgDIOXjDq9W3mWMBibVKtetr0iPj2Fizk05y2QWBqDce6ZHkmwCxSA6vYEgmN0hEaE3bgpBn9xNY85K4cxmvi45FAJyyvxMkrqeXVgaP2jbeKg-OPthtu-Nt29ch3YLcRcFIb6SwZKF7CFYa6A6J9ytblUiYmp2nJTdihGjgOs53fv7sLi9UmszsBuQcLxXtJ--ylFOmBV89Pn_3g1Q |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5Remg5lAKtWB6tD71UqpdkM_aujxWCLoXQyyK4RY53QhEoi7rJpb-esfMQahHiFiVOYnk8nhmPv28AvrjEWSwUymg-TyTqJJZsx0myZ1Hw9ElUEeBj6bmeXuDPK3W1At96LAwRhcNnNPSXIZc_X7jab5Vx8K5GqPAVvGa7j6pBa_U5A1Rxww0eswpz1NElJSNzMDuZNWydns9Me4z9IyMUqqr8txQH-3K8DmnXs-ZYye2wrvKh-_sPaeNLu_4e3rWOpvjezIwNWKFyE9a7Ig6i1elNWHvESLgFU5424oetlx5bKVJeKWS1kL9KEmHrsAUHCo9JKOlOXN5Uv4UHDd4EvC__L_UlVa5p-QEujo9mh1PZFluQjnW6kmgIc7JmTMpOTIQ2QRafmWs79l5UPLYRFRy-YDIau8LzgCljc6NHxo6I-PZHWC0XJW2DwNxZjnbJ8VqARaInTrMuElptErQ2HsBBN_qZa5nIfUGMuyxEJJHJWF6Zl1fWymsAX_s37hsWjmfabvnh79u1Iz-A3U7AWaumy2yi2YhrjM0ARP-U9csnTWxJi5qbsEs18SxmO09_9zO8mc7Ss-zs5Px0F942W87-POQerFZ_atpnn6XKP4Wp-gCOz-Qi |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Gaussian+Many-to-One+Interference+Channel+With+Confidential+Messages&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Xiang+He&rft.au=Yener%2C+A&rft.date=2011-05-01&rft.pub=IEEE&rft.issn=0018-9448&rft.volume=57&rft.issue=5&rft.spage=2730&rft.epage=2745&rft_id=info:doi/10.1109%2FTIT.2011.2119650&rft.externalDocID=5752454 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |