Title :
Capacity Bounds for Broadcast Channels With Confidential Messages
Author :
Xu, Jin ; Cao, Yi ; Chen, Biao
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
Abstract :
This paper studies capacity bounds for discrete memoryless broadcast channels with confidential messages. Two private messages as well as a common message are transmitted; the common message is to be decoded by both receivers, while each private message is only for its intended receiver. In addition, each private message is to be kept secret from the unintended receiver where secrecy is measured by equivocation. Both inner and outer bounds are proposed to the rate equivocation region for broadcast channels with confidential messages. The proposed inner bound generalizes Csiszar and Korner´s rate equivocation region for broadcast channels with a single confidential message, Liu ´s achievable rate region for broadcast channels with perfect secrecy, Marton´s and Gel´fand-Pinsker´s achievable rate region for general broadcast channels. The proposed outer bounds, together with the inner bound, help establish the rate equivocation region of several classes of discrete memoryless broadcast channels with confidential messages, including the less noisy, deterministic, and semideterministic broadcast channels. Furthermore, specializing to the general broadcast channel by removing the confidentiality constraint, the proposed outer bounds reduce to new capacity outer bounds for the discrete memory broadcast channel.
Keywords :
broadcast channels; memoryless systems; telecommunication security; capacity bounds; confidential messages; discrete memoryless broadcast channels; private message; rate equivocation region; Broadcasting; Communication system security; Cryptography; Data security; Decoding; Global communication; Information security; Information theory; National security; Transceivers; Broadcast channels with confidential messages; capacity bounds; information-theoretic secrecy; provable security; rate equivocation region; secure communications;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2009.2027500