TY - GEN
T1 - Secrecy measures for broadcast channels with receiver side information
T2 - 2014 IEEE Information Theory Workshop, ITW 2014
AU - Mansour, Ahmed S.
AU - Schaefer, Rafael F.
AU - Boche, Holger
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - We study the transmission of a common message and three confidential messages over a broadcast channel with two legitimate receivers and an eavesdropper. Each legitimate receiver is interested in decoding two of the three confidential messages, while having the third one as side information. In order to measure the ignorance of the eavesdropper about the confidential messages, we investigate two different secrecy criteria: joint secrecy and individual secrecy. For both criteria, we provide a general achievable rate region. We establish both the joint and individual secrecy capacity if the two legitimate receivers are less noisy than the eavesdropper. We further investigate the scenario where the eavesdropper is less noisy than the two legitimate receivers. It is known that the joint secrecy constraints can not be fulfilled under this scenario, however, we manage to establish a non vanishing capacity region for the individual secrecy case.
AB - We study the transmission of a common message and three confidential messages over a broadcast channel with two legitimate receivers and an eavesdropper. Each legitimate receiver is interested in decoding two of the three confidential messages, while having the third one as side information. In order to measure the ignorance of the eavesdropper about the confidential messages, we investigate two different secrecy criteria: joint secrecy and individual secrecy. For both criteria, we provide a general achievable rate region. We establish both the joint and individual secrecy capacity if the two legitimate receivers are less noisy than the eavesdropper. We further investigate the scenario where the eavesdropper is less noisy than the two legitimate receivers. It is known that the joint secrecy constraints can not be fulfilled under this scenario, however, we manage to establish a non vanishing capacity region for the individual secrecy case.
UR - http://www.scopus.com/inward/record.url?scp=84929340341&partnerID=8YFLogxK
U2 - 10.1109/ITW.2014.6970867
DO - 10.1109/ITW.2014.6970867
M3 - Conference contribution
AN - SCOPUS:84929340341
T3 - 2014 IEEE Information Theory Workshop, ITW 2014
SP - 426
EP - 430
BT - 2014 IEEE Information Theory Workshop, ITW 2014
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 2 November 2014 through 5 November 2014
ER -