K-user interference channels: Achievable secrecy rate and degrees of freedom
In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interferen...
Saved in:
Published in | 2009 IEEE Information Theory Workshop on Networking and Information Theory pp. 336 - 340 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2009
|
Subjects | |
Online Access | Get full text |
ISBN | 1424445353 9781424445356 |
DOI | 10.1109/ITWNIT.2009.5158598 |
Cover
Abstract | In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interference. In addition, we derive the secure degrees of freedom for a range of channel parameters. As a by-product of our approach, we also demonstrate that nested lattice codes are useful for K-user symmetric interference channels without secrecy constraints in that they yield higher degrees of freedom than previous results. |
---|---|
AbstractList | In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interference. In addition, we derive the secure degrees of freedom for a range of channel parameters. As a by-product of our approach, we also demonstrate that nested lattice codes are useful for K-user symmetric interference channels without secrecy constraints in that they yield higher degrees of freedom than previous results. |
Author | Xiang He Yener, A. |
Author_xml | – sequence: 1 surname: Xiang He fullname: Xiang He organization: Electr. Eng. Dept., Pennsylvania State Univ., University Park, PA, USA – sequence: 2 givenname: A. surname: Yener fullname: Yener, A. organization: Electr. Eng. Dept., Pennsylvania State Univ., University Park, PA, USA |
BookMark | eNo1UEtOwzAUNIJK0NITdOMLpPj5xT92VcUnooJNEMvKdV5oUOoiuyD19gRRZjMz0swsZswu4j4SYzMQcwDhbqr67bmq51IIN1egrHL2jE2dsVDKsiwVajxn43-jcMTGv1kn0ApzyaY5f4gBamgauGKrp-IrU-JdPFBqKVEMxMPWx0h9vuWLsO3o22964plConDkyR-I-9jwht4TUeb7lreDaPa7azZqfZ9peuIJe72_q5ePxerloVouVkUHRh0K0EJq6xFMg0Y2rdEuNB69KNtSWhRKOGWC1maDOgTQWkovjUZAK8GCwQmb_e12RLT-TN3Op-P69Ab-ALEUUSs |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ITWNIT.2009.5158598 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781424445363 1424445361 |
EndPage | 340 |
ExternalDocumentID | 5158598 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-160268a317d372df769cda3a04f4283050957c667b36cc16622a2763138218173 |
IEDL.DBID | RIE |
ISBN | 1424445353 9781424445356 |
IngestDate | Wed Aug 27 02:04:36 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCN | 2009903807 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-160268a317d372df769cda3a04f4283050957c667b36cc16622a2763138218173 |
PageCount | 5 |
ParticipantIDs | ieee_primary_5158598 |
PublicationCentury | 2000 |
PublicationDate | 2009-June |
PublicationDateYYYYMMDD | 2009-06-01 |
PublicationDate_xml | – month: 06 year: 2009 text: 2009-June |
PublicationDecade | 2000 |
PublicationTitle | 2009 IEEE Information Theory Workshop on Networking and Information Theory |
PublicationTitleAbbrev | ITWNIT |
PublicationYear | 2009 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000558571 |
Score | 1.5226268 |
Snippet | In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 336 |
SubjectTerms | Decoding Fading Helium Interference channels Interference constraints Jamming Laboratories Lattices Protection Wireless communication |
Title | K-user interference channels: Achievable secrecy rate and degrees of freedom |
URI | https://ieeexplore.ieee.org/document/5158598 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3NT8IwGMYb4ORJDRi_04NHBxvd2tWbMRJQIR4gciP9eBeJcTMwTPSvt-8-MBoP3rp1WZp22fv0bZ9fCbkwwEUSxNoLAdwERUfSkzJhXsIU5z4TfdDodx5P-HAW3s2jeYNcbr0wAFBsPoMuFou1fJuZDabKei72xpGMm6TpPrPSq7XNp_iRqxNB7d0KIxaxGulUXfOKOhT4sjeaPk1G05JXWb32x_kqRXgZ7JJx3bByV8lLd5Prrvn8xWz8b8v3SOfbyEcftyFqnzQgbZOHew9TExRJEav6KTQApy5OXtFr87yEd3RU0TVqSvNBESdBVWqpBTc9hzXNEpq4gs1eO2Q2uJ3eDL3qUAVv6ZRC7gV45lSsnGywbiRsIrg0VjHlhwmy1xAHEwnDudCMGxNw3u-rvvsJIavQqQHBDkgrzVI4JBQU-EJbbp0GDGPppAXSCWMVGa1NGMoj0saeWLyV3IxF1QnHf98-ITvlSg1mOE5JK19t4MwF_FyfFyP9BeUdpRg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ25T8MwFMatUgaYALWIGw-MpE3iK2ZDiKqlhxhS0a3yFVEhEtSmSPDXY-coAjGwOYciy5byPj_7-z0ArpShLAki6WFj7AJFEu5xniAvQYJSH7HQSOd3Hk9of4ofZmTWANcbL4wxpjh8ZjquWezl60ytXaqsa2NvRHi0BbZt3MekdGttMio-sU9ZULu3MEEE1VCn6ppW3KHA591B_DQZxCWxsvrwjworRYDp7YFx3bXyXMlLZ53Ljvr8RW38b9_3QfvbygcfN0HqADRM2gKjoeeSE9CxIpb1W84CnNpIeQNv1fPCvDtPFVw5Vak-oANKQJFqqI1doJsVzBKY2IbOXttg2ruP7_peVVbBW1itkHuBqzoVCSsctJ0LnTDKlRZI-Dhx9DUHhCFMUcokokoFlIahCO1vyNEKrR5g6BA00yw1RwAaYXwmNdVWBeKIW3Hh-ISRIEpKhTE_Bi03EvO3kpwxrwbh5O_bl2CnH49H89FgMjwFu-W-jct3nIFmvlybcxv-c3lRzPoXwkmoZQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Information+Theory+Workshop+on+Networking+and+Information+Theory&rft.atitle=K-user+interference+channels%3A+Achievable+secrecy+rate+and+degrees+of+freedom&rft.au=Xiang+He&rft.au=Yener%2C+A.&rft.date=2009-06-01&rft.pub=IEEE&rft.isbn=9781424445356&rft.spage=336&rft.epage=340&rft_id=info:doi/10.1109%2FITWNIT.2009.5158598&rft.externalDocID=5158598 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/sc.gif&client=summon&freeimage=true |