The Gaussian Many-to-One Interference Channel With Confidential Messages

The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K -user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one inte...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information theory Vol. 57; no. 5; pp. 2730 - 2745
Main Authors Xiang He, Yener, A
Format Journal Article
LanguageEnglish
Published New York IEEE 01.05.2011
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0018-9448
1557-9654
DOI10.1109/TIT.2011.2119650

Cover

Abstract The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K -user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subject to interference, is also one from which the interfering users' messages need to be kept secret from. We derive the achievable secrecy sum rate for this channel using nested lattice codes, as well as an upper bound on the secrecy sum rate for all possible channel gain configurations. We identify several nontrivial cases where the gap between the upper bound and the achieved secrecy sum rate is only a function of the number of the users K , and is uniform over all possible channel gain configurations in each case. In addition, we identify the secure degrees of freedom for this channel and show it to be equivalent to its degrees of freedom, i.e., the secrecy in high SNR comes for free.
AbstractList The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K -user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subject to interference, is also one from which the interfering users' messages need to be kept secret from. We derive the achievable secrecy sum rate for this channel using nested lattice codes, as well as an upper bound on the secrecy sum rate for all possible channel gain configurations. We identify several nontrivial cases where the gap between the upper bound and the achieved secrecy sum rate is only a function of the number of the users K , and is uniform over all possible channel gain configurations in each case. In addition, we identify the secure degrees of freedom for this channel and show it to be equivalent to its degrees of freedom, i.e., the secrecy in high SNR comes for free.
The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general $K$-user interference channel. In this paper, we introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which each receiver, in particular, the one subject to interference, is also one from which the interfering users' messages need to be kept secret from. We derive the achievable secrecy sum rate for this channel using nested lattice codes, as well as an upper bound on the secrecy sum rate for all possible channel gain configurations. We identify several nontrivial cases where the gap between the upper bound and the achieved secrecy sum rate is only a function of the number of the users $K$, and is uniform over all possible channel gain configurations in each case. In addition, we identify the secure degrees of freedom for this channel and show it to be equivalent to its degrees of freedom, i.e., the secrecy in high SNR comes for free. [PUBLICATION ABSTRACT]
Author Yener, A
Xiang He
Author_xml – sequence: 1
  surname: Xiang He
  fullname: Xiang He
  email: xxh119@psu.edu
  organization: Dept. of Electr. Eng., Pennsylvania State Univ., University Park, PA, USA
– sequence: 2
  givenname: A
  surname: Yener
  fullname: Yener, A
  email: yener@ee.psu.edu
  organization: Dept. of Electr. Eng., Pennsylvania State Univ., University Park, PA, USA
BookMark eNp9kEFPAjEQRhujiYjeTbxsvHhabLvtdns0RIEEwgXjsRmWWSlZutiWA__eEogHDp46nbxvMvPuyLXrHBLyyOiAMapfF5PFgFPGBpwxXUp6RXpMSpWnWlyTHqWsyrUQ1S25C2GTvkIy3iPjxRqzEexDsOCyGbhDHrt87jCbuIi-QY-uxmy4Buewzb5sXGfDzjV2hS5aaLMZhgDfGO7JTQNtwIfz2yefH--L4TifzkeT4ds0rwvOYy40iiWCViih0lRAIehqpVclKM6qgimg2DAlRMFV3ZRCCqlhqUuugSOmdp-8nObufPezxxDN1oYa2xYcdvtgKiVppTSViXy-IDfd3ru0nKnKQrBSMJ2g8gTVvgvBY2NqGyHazkUPtjWMmqNek_Sao15z1puC9CK483YL_vBf5OkUsYj4h0sleTqz-AVMsIVi
CODEN IETTAW
CitedBy_id crossref_primary_10_1109_JPROC_2015_2445914
crossref_primary_10_1109_TIT_2019_2908832
crossref_primary_10_1155_2013_546260
crossref_primary_10_1007_s11432_014_5098_4
crossref_primary_10_1109_JPROC_2015_2459592
crossref_primary_10_1109_TIT_2014_2343226
crossref_primary_10_1109_TIT_2024_3460472
crossref_primary_10_1109_TIT_2017_2663427
crossref_primary_10_1109_TIFS_2018_2866327
crossref_primary_10_1016_j_phycom_2022_101791
crossref_primary_10_1109_JSAC_2018_2825560
crossref_primary_10_1002_ett_2816
crossref_primary_10_1109_LCOMM_2015_2435733
crossref_primary_10_1109_JSAIT_2021_3062755
crossref_primary_10_1109_TIT_2019_2961099
crossref_primary_10_1109_TIT_2016_2593624
crossref_primary_10_1109_TIT_2021_3137151
crossref_primary_10_1109_TWC_2015_2412531
crossref_primary_10_1109_TIT_2012_2216952
crossref_primary_10_1109_TIT_2017_2786541
Cites_doi 10.1109/ALLERTON.2008.4797604
10.1109/TIT.1978.1055917
10.1109/TIT.2007.899484
10.1109/TIT.2008.921879
10.1109/ISIT.2009.5206054
10.1109/TIT.2005.855591
10.1109/TIT.2010.2054590
10.1109/TIT.2009.2021380
10.1109/TIT.2008.921680
10.1023/A:1007636609202
10.1109/TIT.2011.2132430
10.1109/TIT.2008.928267
10.1109/18.641543
10.1109/ITW.2007.4313092
10.1109/ALLERTON.2009.5394842
10.1109/ITW.2008.4578643
10.1109/TIT.2004.834787
10.1109/TIT.2012.2216952
10.1002/j.1538-7305.1949.tb00928.x
10.1109/CISS.2009.5054738
10.1002/j.1538-7305.1975.tb02040.x
10.1109/ALLERTON.2008.4797670
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2011
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) May 2011
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TIT.2011.2119650
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList
Technology Research Database
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1557-9654
EndPage 2745
ExternalDocumentID 2329634021
10_1109_TIT_2011_2119650
5752454
Genre orig-research
Feature
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYOK
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c322t-49e4bea97e5a8904a340dd9d6a7218317a0ef1744327cf645459ab9629a2ee443
IEDL.DBID RIE
ISSN 0018-9448
IngestDate Thu Sep 04 21:39:14 EDT 2025
Mon Jun 30 03:10:07 EDT 2025
Thu Apr 24 22:57:03 EDT 2025
Tue Jul 01 02:34:28 EDT 2025
Tue Aug 26 17:17:01 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c322t-49e4bea97e5a8904a340dd9d6a7218317a0ef1744327cf645459ab9629a2ee443
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
PQID 863416419
PQPubID 36024
PageCount 16
ParticipantIDs proquest_miscellaneous_875087905
ieee_primary_5752454
crossref_primary_10_1109_TIT_2011_2119650
crossref_citationtrail_10_1109_TIT_2011_2119650
proquest_journals_863416419
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2011-May
2011-5-00
20110501
PublicationDateYYYYMMDD 2011-05-01
PublicationDate_xml – month: 05
  year: 2011
  text: 2011-May
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2011
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref15
ref14
ref10
he (ref13) 2009
ref2
ref1
ref17
ref16
yates (ref9) 2008
ref19
ref18
he (ref11) 0
li (ref7) 2008
ref24
ref23
ref25
ref20
ref22
ref21
ref8
koyluoglu (ref12) 0
ref4
ref3
ref6
ref5
References_xml – ident: ref18
  doi: 10.1109/ALLERTON.2008.4797604
– ident: ref4
  doi: 10.1109/TIT.1978.1055917
– ident: ref24
  doi: 10.1109/TIT.2007.899484
– ident: ref5
  doi: 10.1109/TIT.2008.921879
– ident: ref3
  doi: 10.1109/ISIT.2009.5206054
– ident: ref22
  doi: 10.1109/TIT.2005.855591
– ident: ref15
  doi: 10.1109/TIT.2010.2054590
– ident: ref20
  doi: 10.1109/TIT.2009.2021380
– ident: ref23
  doi: 10.1109/TIT.2008.921680
– year: 0
  ident: ref11
  article-title: Providing Secrecy with structured codes: Tools and applications to gaussian two-user channels
  publication-title: IEEE Trans Inf Theory
  doi: 10.1023/A:1007636609202
– ident: ref14
  doi: 10.1109/TIT.2011.2132430
– year: 2008
  ident: ref7
  article-title: Secrecy capacity region of a class of one-sided interference channel
  publication-title: IEEE Int Symp Information Theory
  doi: 10.1109/TIT.2008.928267
– ident: ref17
  doi: 10.1109/18.641543
– ident: ref21
  doi: 10.1109/ITW.2007.4313092
– year: 2009
  ident: ref13
  article-title: <formula formulatype="inline"><tex Notation="TeX">$K$</tex> </formula>-user interference channels: Achievable secrecy rate and degrees of freedom
  publication-title: IEEE Information Theory Workshop
– ident: ref16
  doi: 10.1109/ALLERTON.2009.5394842
– ident: ref6
  doi: 10.1109/ITW.2008.4578643
– year: 2008
  ident: ref9
  article-title: Secure communication on interference channels
  publication-title: IEEE Int Symp Information Theory
– ident: ref19
  doi: 10.1109/TIT.2004.834787
– ident: ref25
  doi: 10.1109/TIT.2012.2216952
– year: 0
  ident: ref12
  article-title: Cooperative binning and channel prefixing for secrecy in interference channels
  publication-title: IEEE Trans Inf Theory
– ident: ref1
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref10
  doi: 10.1109/CISS.2009.5054738
– ident: ref2
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref8
  doi: 10.1109/ALLERTON.2008.4797670
SSID ssj0014512
Score 2.1676714
Snippet The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2730
SubjectTerms Channel models
Channels
Codes
Communication channels
Communications networks
Degrees of freedom
Electric noise
Gain
Gaussian
Information theoretic secrecy
Information theory
Interference
interference channel
Interference channels
lattice code
Lattices
Mathematical analysis
Messages
Receivers
Transmitters
Upper bound
Upper bounds
Title The Gaussian Many-to-One Interference Channel With Confidential Messages
URI https://ieeexplore.ieee.org/document/5752454
https://www.proquest.com/docview/863416419
https://www.proquest.com/docview/875087905
Volume 57
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLaAExx4I8ZLOXBBIqNd3Ww5IgQMpMFlCG5VmrmAQB1i7YVfj5M-hAAhblWbtlFsJ3ac7zPAoY2swSxGGUwmkUQVhZLXcZLsWWSsPlGcefjY6EYN7_D6IX6Yg-MWC0NE_vAZdd2lz-VPprZ0W2UcvMc9jHEe5lnNKqxWmzHAOKyYwUM2YI45mpRkoE_GV-OKq9OxmSmHsP-yBPmaKj8mYr-6XKzAqOlXdajkpVsWadd-fKNs_G_HV2G5djPFaaUXazBH-TqsNCUcRG3R67D0hY9wA4asNOLSlDOHrBQjnidkMZW3OQm_cVhDA4VDJOT0Ku6fiyfhIIPPHu3L_xu5giqPNNuEu4vz8dlQ1qUWpGWLLiRqwpSM7lNsBjpAEyELT0-U6TsfKuybgDIOXjDq9W3mWMBibVKtetr0iPj2Fizk05y2QWBqDce6ZHkmwCxSA6vYEgmN0hEaE3bgpBn9xNY85K4cxmvi45FAJyyvxMkrqeXVgaP2jbeKg-OPthtu-Nt29ch3YLcRcFIb6SwZKF7CFYa6A6J9ytblUiYmp2nJTdihGjgOs53fv7sLi9UmszsBuQcLxXtJ--ylFOmBV89Pn_3g1Q
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5Remg5lAKtWB6tD71UqpdkM_aujxWCLoXQyyK4RY53QhEoi7rJpb-esfMQahHiFiVOYnk8nhmPv28AvrjEWSwUymg-TyTqJJZsx0myZ1Hw9ElUEeBj6bmeXuDPK3W1At96LAwRhcNnNPSXIZc_X7jab5Vx8K5GqPAVvGa7j6pBa_U5A1Rxww0eswpz1NElJSNzMDuZNWydns9Me4z9IyMUqqr8txQH-3K8DmnXs-ZYye2wrvKh-_sPaeNLu_4e3rWOpvjezIwNWKFyE9a7Ig6i1elNWHvESLgFU5424oetlx5bKVJeKWS1kL9KEmHrsAUHCo9JKOlOXN5Uv4UHDd4EvC__L_UlVa5p-QEujo9mh1PZFluQjnW6kmgIc7JmTMpOTIQ2QRafmWs79l5UPLYRFRy-YDIau8LzgCljc6NHxo6I-PZHWC0XJW2DwNxZjnbJ8VqARaInTrMuElptErQ2HsBBN_qZa5nIfUGMuyxEJJHJWF6Zl1fWymsAX_s37hsWjmfabvnh79u1Iz-A3U7AWaumy2yi2YhrjM0ARP-U9csnTWxJi5qbsEs18SxmO09_9zO8mc7Ss-zs5Px0F942W87-POQerFZ_atpnn6XKP4Wp-gCOz-Qi
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Gaussian+Many-to-One+Interference+Channel+With+Confidential+Messages&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Xiang+He&rft.au=Yener%2C+A&rft.date=2011-05-01&rft.pub=IEEE&rft.issn=0018-9448&rft.volume=57&rft.issue=5&rft.spage=2730&rft.epage=2745&rft_id=info:doi/10.1109%2FTIT.2011.2119650&rft.externalDocID=5752454
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon