K-user interference channels: Achievable secrecy rate and degrees of freedom

In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interferen...

Full description

Saved in:
Bibliographic Details
Published in2009 IEEE Information Theory Workshop on Networking and Information Theory pp. 336 - 340
Main Authors Xiang He, Yener, A.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2009
Subjects
Online AccessGet full text
ISBN1424445353
9781424445356
DOI10.1109/ITWNIT.2009.5158598

Cover

Abstract In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interference. In addition, we derive the secure degrees of freedom for a range of channel parameters. As a by-product of our approach, we also demonstrate that nested lattice codes are useful for K-user symmetric interference channels without secrecy constraints in that they yield higher degrees of freedom than previous results.
AbstractList In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interference. In addition, we derive the secure degrees of freedom for a range of channel parameters. As a by-product of our approach, we also demonstrate that nested lattice codes are useful for K-user symmetric interference channels without secrecy constraints in that they yield higher degrees of freedom than previous results.
Author Xiang He
Yener, A.
Author_xml – sequence: 1
  surname: Xiang He
  fullname: Xiang He
  organization: Electr. Eng. Dept., Pennsylvania State Univ., University Park, PA, USA
– sequence: 2
  givenname: A.
  surname: Yener
  fullname: Yener, A.
  organization: Electr. Eng. Dept., Pennsylvania State Univ., University Park, PA, USA
BookMark eNo1UEtOwzAUNIJK0NITdOMLpPj5xT92VcUnooJNEMvKdV5oUOoiuyD19gRRZjMz0swsZswu4j4SYzMQcwDhbqr67bmq51IIN1egrHL2jE2dsVDKsiwVajxn43-jcMTGv1kn0ApzyaY5f4gBamgauGKrp-IrU-JdPFBqKVEMxMPWx0h9vuWLsO3o22964plConDkyR-I-9jwht4TUeb7lreDaPa7azZqfZ9peuIJe72_q5ePxerloVouVkUHRh0K0EJq6xFMg0Y2rdEuNB69KNtSWhRKOGWC1maDOgTQWkovjUZAK8GCwQmb_e12RLT-TN3Op-P69Ab-ALEUUSs
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ITWNIT.2009.5158598
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424445363
1424445361
EndPage 340
ExternalDocumentID 5158598
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-160268a317d372df769cda3a04f4283050957c667b36cc16622a2763138218173
IEDL.DBID RIE
ISBN 1424445353
9781424445356
IngestDate Wed Aug 27 02:04:36 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009903807
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-160268a317d372df769cda3a04f4283050957c667b36cc16622a2763138218173
PageCount 5
ParticipantIDs ieee_primary_5158598
PublicationCentury 2000
PublicationDate 2009-June
PublicationDateYYYYMMDD 2009-06-01
PublicationDate_xml – month: 06
  year: 2009
  text: 2009-June
PublicationDecade 2000
PublicationTitle 2009 IEEE Information Theory Workshop on Networking and Information Theory
PublicationTitleAbbrev ITWNIT
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000558571
Score 1.5226268
Snippet In this work, we consider achievable secrecy rates for symmetric K-user (K ges 3) interference channels with confidential messages. We find that nested lattice...
SourceID ieee
SourceType Publisher
StartPage 336
SubjectTerms Decoding
Fading
Helium
Interference channels
Interference constraints
Jamming
Laboratories
Lattices
Protection
Wireless communication
Title K-user interference channels: Achievable secrecy rate and degrees of freedom
URI https://ieeexplore.ieee.org/document/5158598
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3NT8IwGMYb4ORJDRi_04NHBxvd2tWbMRJQIR4gciP9eBeJcTMwTPSvt-8-MBoP3rp1WZp22fv0bZ9fCbkwwEUSxNoLAdwERUfSkzJhXsIU5z4TfdDodx5P-HAW3s2jeYNcbr0wAFBsPoMuFou1fJuZDabKei72xpGMm6TpPrPSq7XNp_iRqxNB7d0KIxaxGulUXfOKOhT4sjeaPk1G05JXWb32x_kqRXgZ7JJx3bByV8lLd5Prrvn8xWz8b8v3SOfbyEcftyFqnzQgbZOHew9TExRJEav6KTQApy5OXtFr87yEd3RU0TVqSvNBESdBVWqpBTc9hzXNEpq4gs1eO2Q2uJ3eDL3qUAVv6ZRC7gV45lSsnGywbiRsIrg0VjHlhwmy1xAHEwnDudCMGxNw3u-rvvsJIavQqQHBDkgrzVI4JBQU-EJbbp0GDGPppAXSCWMVGa1NGMoj0saeWLyV3IxF1QnHf98-ITvlSg1mOE5JK19t4MwF_FyfFyP9BeUdpRg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ25T8MwFMatUgaYALWIGw-MpE3iK2ZDiKqlhxhS0a3yFVEhEtSmSPDXY-coAjGwOYciy5byPj_7-z0ArpShLAki6WFj7AJFEu5xniAvQYJSH7HQSOd3Hk9of4ofZmTWANcbL4wxpjh8ZjquWezl60ytXaqsa2NvRHi0BbZt3MekdGttMio-sU9ZULu3MEEE1VCn6ppW3KHA591B_DQZxCWxsvrwjworRYDp7YFx3bXyXMlLZ53Ljvr8RW38b9_3QfvbygcfN0HqADRM2gKjoeeSE9CxIpb1W84CnNpIeQNv1fPCvDtPFVw5Vak-oANKQJFqqI1doJsVzBKY2IbOXttg2ruP7_peVVbBW1itkHuBqzoVCSsctJ0LnTDKlRZI-Dhx9DUHhCFMUcokokoFlIahCO1vyNEKrR5g6BA00yw1RwAaYXwmNdVWBeKIW3Hh-ISRIEpKhTE_Bi03EvO3kpwxrwbh5O_bl2CnH49H89FgMjwFu-W-jct3nIFmvlybcxv-c3lRzPoXwkmoZQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Information+Theory+Workshop+on+Networking+and+Information+Theory&rft.atitle=K-user+interference+channels%3A+Achievable+secrecy+rate+and+degrees+of+freedom&rft.au=Xiang+He&rft.au=Yener%2C+A.&rft.date=2009-06-01&rft.pub=IEEE&rft.isbn=9781424445356&rft.spage=336&rft.epage=340&rft_id=info:doi/10.1109%2FITWNIT.2009.5158598&rft.externalDocID=5158598
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/sc.gif&client=summon&freeimage=true