Abstract
In this paper, the general wiretap channel with channel state information (CSI) at the transmitter and noiseless feedback is investigated, where the feedback is from the legitimate receiver to the transmitter, and the CSI is available at the transmitter in a causal or noncausal manner. The capacity-equivocation regions are determined for this model in both causal and noncausal cases, and the results are further explained via Gaussian and binary examples. For the Gaussian model, we find that in some particular cases, the noiseless feedback performs better than Chia and El Gamal’s CSI sharing scheme, i.e., the secrecy capacity of this feedback scheme is larger than that of the CSI sharing scheme. For the degraded binary model, we find that the noiseless feedback performs no better than Chia and El Gamal’s CSI sharing scheme. However, if the cross-over probability of the wiretap channel is large enough, we show that the two schemes perform the same.
1. Introduction
It is known to all that the capacity of a point-to-point discrete memoryless channel (DMC) cannot be increased by using noiseless feedback. However, does the feedback (from the legitimate receiver to the transmitter) enhance the security of the wiretap channel? Ahlswede and Cai [] and Dai et al. [] studied this problem. Specifically, Ahlswede and Cai [] showed that the secrecy capacity of the degraded wiretap channel with noiseless feedback is given by:
where X, Y and Z are for the transmitter, legitimate receiver and wiretapper, respectively, and forms a Markov chain. Recall that the secrecy capacity of the degraded wiretap channel is determined by Wyner [], and it is given by:
From (1) and (2), it is easy to see that the noiseless feedback increases the secrecy capacity of the wiretap channel. Based on the work of [], Dai et al. [] studied a special wiretap channel with feedback () and showed that the secrecy capacity of this model is larger than that of the model without feedback, i.e., the noiseless feedback helps to enhance the security of the special wiretap channel . Here, note that in [] and [], the legitimate receiver just sends back the previous received symbols to the transmitter, and it is natural to ask: is it better for the legitimate receiver to send back purely random secret keys to the transmitter? Ardestanizadeh et al. [] answered this question by considering the model of the wiretap channel with secure rate-limited feedback. Ardestanizadeh et al. [] showed that if the limits (capacity) of the feedback channel are denoted by , the secrecy capacity of the physically-degraded wiretap channel () with secure rate-limited feedback is given by:
Compared to (1), it is easy to see that if , sending purely random secret keys is no better than sending back. If , , sending purely random secret keys is better than sending back. Besides these works on the wiretap channel with feedback, Lai et al. [] studied the wiretap channel with noisy feedback; He et al. [] studied the Gaussian two-way wiretap channel and the Gaussian half-duplex two-way relay channel with an un-trusted relay; and Bassi et al. [] studied the wiretap channel with generalized feedback. Bounds on the secrecy capacities of these feedback models are obtained in [,,].
Recently, the wiretap channel with channel state information (CSI) has received much attention. The Gaussian wiretap channel with noncausal CSI at the transmitter was studied in [,], and an achievable rate-equivocation region was provided for this Gaussian model. Based on the work of [], Chen et al. [] studied the discrete memoryless wiretap channel with noncausal CSI at the transmitter and also provided an achievable rate-equivocation region for this model. The encoding-decoding scheme of [] is a combination of the binning technique of Gel’fand and Pinsker’s channel [] and the random binning technique of Wyner’s wiretap channel []. After that, Dai et al. [] studied the outer bound on the capacity-equivocation region of [] and also investigated the capacity results of the discrete memoryless wiretap channel with causal or memoryless CSI at the transmitter. Besides these works on the wiretap channel with CSI only available at the transmitter, Chia and El Gamal [] investigated the wiretap channel with CSI causally or non-causally at both the transmitter and the legitimate receiver and provided an achievable secrecy rate, which was larger than that of []. In [], since both the transmitter and the legitimate receiver have access to the CSI, the CSI serves as a secret key shared by them. Therefore, the encoding-decoding scheme of [] is similar to that of the wiretap channel with rate-limited feedback []. Besides these works on the wiretap channel with CSI, Liu et al. [] studied the block Rayleigh fading MIMO wiretap channel with no CSI available at the legitimate receiver, the wiretapper and the transmitter, and they showed that if the legitimate receiver had more antennas than the wiretapper, non-zero secure degrees of freedom (s.d.o.f) could also be achieved.
In this paper, we study the general wiretap channel with CSI (causally or non-causally at the transmitter) and noiseless feedback; see Figure 1. In Figure 1, the transition probability of the channel depends on a CSI sequence , which is available at the channel encoder in a noncausal or causal manner. The inputs of the channel are and , while the outputs of the channel are and . Moreover, there exists a noiseless feedback from to the channel encoder. The motivation of this work is to find whether the noiseless feedback helps to enhance the secrecy rate of the wiretap channel with noncausal or causal CSI at the transmitter [,] and whether the noiseless feedback does better than the shared CSI between the legitimate receiver and the transmitter [] in enhancing the secrecy rate of the state-dependent wiretap channel.
Figure 1.
General wiretap channel with noncausal or causal channel state information (CSI) and noiseless feedback.
The capacity-equivocation region of the model of Figure 1 is determined for both the noncausal and causal cases, and the results are further explained via degraded binary and Gaussian examples. For the Gaussian example, we find that both the feedback scheme and the CSI sharing scheme [] help to enhance the security of the wiretap channel with noncausal CSI at the transmitter [,], and moreover, we find that in some particular cases, the noiseless feedback performs even better than the shared CSI [], i.e., the secrecy capacity of the degraded Gaussian case of the model of Figure 1 is larger than that of the degraded Gaussian case of []. For the binary example, we also find that both the feedback scheme and the CSI sharing scheme [] help to enhance the security of the wiretap channel with causal CSI at the transmitter. Unlike the Gaussian case, we find that the noiseless feedback performs no better than the shared CSI [], i.e., the secrecy capacity of the degraded binary case of the model of Figure 1 is not more than that of the degraded binary case of []. However, if the cross-over probability of the wiretap channel is large enough, we find that the two schemes perform the same.
2. Capacity-Equivocation Region of the Model of Figure 1
In this paper, random variables, sample values and alphabets are denoted by capital letters, lower case letters and calligraphic letters, respectively. A similar convention is applied to the random vectors and their sample values. For example, denotes a random N-vector , and is a specific vector value in that is the N-th Cartesian power of . denotes a random -vector , and is a specific vector value in . Let denote the probability mass function . Throughout the paper, the logarithmic function is to the base two.
2.1. Definitions of the Model of Figure 1
Let W, uniformly distributed over the alphabet , be the message sent by the transmitter. The components of the channel state sequence are independent and identically distributed. The probability of each component is . is independent of W. Let () be the i-th time feedback from the legitimate receiver to the transmitter. For the noncausal case, the i-th time channel encoder is a (stochastic) mapping:
where , , and . For the causal case, the i-th time channel encoder is a (stochastic) mapping:
where , , and . Here, note that for the causal case, is independent of .
The channel is discrete memoryless, and its transition probability is given by:
where , , and .
The wiretapper’s equivocation about the message W is denoted by:
The decoder is a function that maps a received sequence of N channel outputs to the messages set:
We denote the probability of error by .
Given a pair (), it is said to be achievable if, for arbitrary small positive ϵ, there exists an encoding-decoding scheme, such that:
2.2. Main Result of the Model of Figure 1
The following Theorem 1 characterizes the capacity-equivocation region of the model of Figure 1 with noncausal CSI at the transmitter; see the following.
Theorem 1. A single-letter characterization of the region is as follows,
for some distribution:
which implies the Markov chain .
Remark 1.
- The range of the random variable K satisfies . The proof is standard and easily obtained by using the support lemma (see []), and thus, we omit the proof here.
- Corollary 1. The secrecy capacity satisfies:
- Here, note that if is a degraded version of (which implies the existence of the Markov chain ), the capacity-equivocation region still holds. The proof of this degraded case is along the lines of the proof of Theorem 1, and thus, we omit the proof here. In [,], an achievable rate-equivocation region is provided for the wiretap channel with noncausal CSI, and it is given by:where the joint probability distribution of satisfies:Here, note that:where (a) is from . Therefore, it is easy to see that the achievable rate-equivocation region of [] and [] is enhanced by using this noiseless feedback.
The following Theorem 2 characterizes the capacity-equivocation region of the model of Figure 1 with causal CSI at the transmitter; see the following.
Theorem 2. A single-letter characterization of the region is as follows,
for some distribution:
which implies the Markov chain and the fact that V is independent of K.
Proof.
- Proof of the converse: Using the fact that is independent of and , the converse proof of Theorem 2 is along the lines of that of Theorem 1 (see Section A), and thus, we omit the proof here.
- Proof of the achievability: The achievability proof of Theorem 2 is along the lines of the achievability proof of Theorem 1 (see Section B), and the only difference is that for the causal case, there is no need to use the binning technique. Thus, we omit the proof here.
The proof of Theorem 2 is completed. ☐
Remark 2.
- The range of the auxiliary random variable K satisfies . The proof is standard and easily obtained by using the support lemma (see p. 310 of []), and thus, we omit the proof here.
- Corollary 2. The secrecy capacity satisfies:
- Here, note that if is a degraded version of , the capacity-equivocation region still holds. The proof of this degraded case is along the lines of the proof of Theorem 2, and thus, we omit the proof here. In [], an achievable rate-equivocation region is provided for the wiretap channel with causal CSI, and it is given by:where the joint probability distribution of satisfies:By using (15), it is easy to see that the achievable rate-equivocation region is enhanced by using this noiseless feedback.
3. Examples of the Model of Figure 1
3.1. Gaussian Case of the Model of Figure 1 with Noncausal CSI at the Transmitter
For the Gaussian case of the model of Figure 1 with noncausal CSI at the transmitter, the i-th time () channel inputs and outputs are given by:
where , and . Here, note that , and are independent random variables, is independent of and and . The noise is non-causally known by the transmitter. The following Theorem 3 shows the secrecy capacity of the Gaussian case of the model of Figure 1 with noncausal CSI at the transmitter.
Theorem 3. For the Gaussian case of the model of Figure 1 with noncausal CSI at the transmitter, the secrecy capacity is characterized in the following two cases.
Case 1: If , the secrecy capacity is given by:
where the maximum is achieved when .
Case 2: If , the secrecy capacity is given by:
Remark 3.
If , the relationship of the channel inputs and outputs defined in (20) can be equivalently characterized by:
where , and it is independent of . Similar to the determination of the capacity region of the Gaussian broadcast channel (pp. 117–118 of []), the relationship (23) implies that there exists a Markov chain , i.e., the Gaussian case of the model of Figure 1 reduces to a degraded model of Figure 1.
Analogously, if , the relationship of the channel inputs and outputs defined in (20) can be equivalently characterized by:
where , and it is independent of , and . The relationship (24) implies that there exists a Markov chain in the Gaussian case of the model of Figure 1.
Proof. For the direct part of Theorem 3, like [] and [], the achievability of is proven by substituting , , and the fact that X is independent of V in Theorem 1; the details of the proof are omitted in this paper. Here, note that the calculation of is exactly the same as that of the dirty paper channel (page 440 of []), and it is easy to see that the maximum of is achieved when .
For the converse part of Theorem 3, note that the transmitter-receiver channel is Costa’s dirty paper channel []; thus, the secrecy capacity is upper bounded by the capacity of the dirty paper channel, i.e., . Now, it remains to show for and for ; see the following.
Proof of for :
First, note that:
where (a) is from Fano’s inequality. The conditional differential entropy in (25) is bounded by:
where (1) is from Definition (23), (2) is from the fact that is independent of , and , (3) is from the entropy power inequality (see []), (4) is from the fact that the differential entropy of a Gaussian distributed random variable X is (here, is the variance of the Gaussian random variable X) and (5) is from increasing while is increasing and the fact that (here, note that “=” is achieved if ).
Substituting (26) into (25), we have:
Substituting into (27) and letting , it is easy to see that for .
Proof of for :
For the case , the conditional differential entropy in (25) can be bounded by:
where (a) is from (24), (b) is from the fact that is independent of , and and (c) is from the fact that the differential entropy of a Gaussian distributed random variable X is (here, is the variance of the Gaussian random variable X). Substituting (28) and into (25) and letting , it is easy to see that for . Thus, the converse part of Theorem 3 is proven. The proof of Theorem 3 is completed. ☐
In [] (p.2841, Theorem 3), Chia and El Gamal showed that if Y is less noisy than Z ( for every ), the secrecy capacity of the wiretap channel with CSI non-causally known by both the transmitter and the legitimate receiver is given by:
Here, the in the above can be rewritten as follows.
Substituting (29) into , we have:
On the other hand, for Z less noisy than Y ( for every ), Chia and El Gamal provided an achievable secrecy rate (lower bound on the secrecy capacity) for the wiretap channel with CSI non-causally known by both the transmitter and the legitimate receiver, and it is given by:
The following Theorem 4 shows the results on the secrecy capacity of the Gaussian case of the wiretap channel with CSI non-causally known by both the transmitter and the legitimate receiver.
Theorem 4. For the Gaussian wiretap channel with part of the Gaussian noise non-causally known by both the transmitter and the legitimate receiver, the secrecy capacity is characterized by the following two cases.
Case 1: If , the secrecy capacity is given by:
Case 2: If , a lower bound on the secrecy capacity is given by:
Remark 4.
For the Gaussian case, the conditional mutual information is calculated by using the fact that when the CSI is known by both the legitimate receiver and the transmitter, it can be simply subtracted off, which in effect reduces the channel to a Gaussian channel with no CSI, i.e., . Analogously, we have . Then, it is easy to see that Y is less noisy than Z ( for every ), which can be further expressed by , and Z is less noisy than Y ( for every ), which can be further expressed by .
Proof. The achievability proof of (32) and (33) is easily obtained by substituting , and (20) into (30) and (31), respectively. Now, it remains to prove the converse of (32); see the following.
The converse part of (32) is based on the converse proof of (30), (see p.2846, Proof of Theorem 2 of [] and the left bottom and right top of page 2841 []). However, the converse proof of (30) is for the discrete memoryless case, and it needs to be further processed for the Gaussian case. Based on the converse proof of (30) [] and the fact that , we have the following (34) and (35),
and:
where (1) is from (29), (2) is from Definition (23) and , (3) is from the fact that the differential entropy of a Gaussian distributed random variable X is (here, is the variance of the Gaussian random variable X), (4) is from the entropy power inequality (see []), (5) is from , (6) is from increasing while is increasing and the fact that (here, note that “=” is achieved if ), (7) is from Definition (23) and (8) is from . Thus, the converse part of (32) is proven. The proof of Theorem 4 is completed. ☐
Recall that for the degraded Gaussian wiretap channel with noncausal CSI at the transmitter (), an achievable secrecy rate (a lower bound on the secrecy capacity) is provided []; see the following Theorem 5.
Theorem 5. For the Gaussian non-feedback model of Figure 1 with the condition that , an achievable secrecy rate is denoted by:
Proof. The result is directly obtained from [], and therefore, the proof is omitted here. ☐
Remark 5.
- To the best of the authors’ knowledge, for the case , the bounds on the secrecy capacity of the Gaussian wiretap channel with noncausal CSI at the transmitter are still unknown.
Finally, note that if the CSI is not available at the legitimate receiver, the wiretapper and the transmitter and there is no feedback link from the legitimate receiver to the transmitter, the Gaussian case of the model of Figure 1 (see (20)) reduces to the model of the Gaussian wiretap channel, where and of (20) are the legitimate receiver’s channel noises and and are the wiretapper’s channel noises. From [], it is easy to see that the secrecy capacity of the Gaussian wiretap channel is given by:
Comparing Theorem 3 to Theorem 4, we can conclude that if , for given P, and , is larger than if and only if:
For the case that , we find that if , for given P, and , is larger than if and only if:
If , is always larger than .
If , for given P, and , is larger than if and only if:
Figure 2.
For , the relationships of , , and for several values of , and Q.
For the case , Figure 2 plots the relationships of , , and for several values of , and Q. It is easy to see that the noiseless feedback (), the CSI sharing scheme () and the CSI only available at the transmitter () help to enhance the secrecy capacity of the Gaussian wiretap channel. Furthermore, we can see that both the noiseless feedback and the CSI sharing scheme perform better than the CSI only available at the transmitter. Moreover, when Q is small (), the noiseless feedback performs better than the CSI sharing scheme, and while Q is increasing (), the CSI sharing scheme is beginning to take advantage of the noiseless feedback.
For the case , the following Figure 3 plots the relationships of and for several values of , and Q. Since for the case that , both the noiseless feedback () and the CSI sharing scheme () enhance the secrecy capacity of the Gaussian wiretap channel. Moreover, we can see that for fixed Q, if the gap between the legitimate receiver’s channel noise variance and the wiretapper’s channel noise variance is large, the noiseless feedback performs better than the CSI sharing scheme, and vice versa.
Figure 3.
For , the relationships of and for several values of , and Q.
3.2. Binary Case of the Model of Figure 1
In this subsection, we calculate the secrecy capacity of a degraded binary case of the model of Figure 1 with causal CSI at the transmitter, where “degraded” means that there exists a Markov chain .
Suppose that the random variable V is uniformly distributed over , i.e., . Meanwhile, the random variables X, Y and Z take values in , and the wiretap channel is a BSC (binary symmetric channel) with crossover probability q. The transition probability of the main channel is defined as follows:
When ,
When ,
From Remark 2, we know that the secrecy capacity for the model of Figure 1 with causal CSI at the transmitter is given by:
and the maximum achievable secrecy rate of the wiretap channel with causal CSI [] is given by:
where (43) is from (19).
In addition, from ([], Theorem 3), we know that the secrecy capacity of the wiretap channel with CSI causally or non-causally at both the transmitter and the legitimate receiver is given by:
It remains to calculate , and ; see the following.
The calculation of and :
Let K take values in . The probability of K is defined as follows. , and . Define the conditional probability mass function as follows.
, , , ,
, , , .
The joint probability mass functions is calculated by:
Then, we have:
By calculating, we have:
and:
where and .
The calculation of :
Define , , , .
By calculating, is given by:
The following Figure 4, Figure 5 and Figure 6 show , and for several values of q. Here, note that the noise of the wiretap channel is increasing while q is increasing. It is easy to see that when , and are always larger than , i.e., both the noiseless feedback (the model of this paper) and the shared CSI [] help to enhance the security of the wiretap channel with causal CSI at the transmitter. When , there is no wiretapper in the channel; thus, .
Moreover, from Figure 4, Figure 5 and Figure 6, we see that the noiseless feedback performs no better than the shared CSI. However, when q is large enough (satisfying ), the two ways perform the same.
Figure 4.
The , and for .
Figure 5.
The , and for .
Figure 6.
The , and for .
4. Conclusions
In this paper, we study the general wiretap channel with CSI and noiseless feedback, where the CSI is available at the transmitter in a noncausal or causal manner. Both the capacity-equivocation region and the secrecy capacity are determined for the noncausal and causal cases, and the results are further explained via Gaussian and binary examples. For the Gaussian example, we show that both the noiseless feedback and the CSI sharing scheme [] help to enhance the security of the Gaussian wiretap channel. Moreover, we show that in some particular cases, the noiseless feedback performs even better than the CSI sharing scheme []. For the degraded binary example, we also find that the noiseless feedback enhances the security of the wiretap channel with causal CSI. Unlike the Gaussian example, we find that the noiseless feedback always performs no better than the CSI sharing scheme [].
Acknowledgment
The authors would like to thank the anonymous reviewers for their valuable suggestions to improve this paper. This work was supported by a sub-project in the National Basic Research Program of China under Grant 2012CB316100 on Broadband Mobile Communications at High Speeds, the National Natural Science Foundation of China under Grant 61301121, the Fundamental Research Fund for the Central Universities under Grant 2682014CX099, the Key Grant Project of Chinese Ministry of Education (No. 311031 100), the Young Innovative Research Team of Sichuan Province (2011JTD0007) and the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (No. 2014D01).
Author Contributions
Bin Dai designed research; Bin Dai and Zheng Ma performed research; Linman Yu analyzed the data; Bin Dai wrote the paper. All authors have read and approved the final manuscript.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix
A. Converse Proof of Theorem 1
Given an achievable pair, we need to show that there exists a joint distribution of the form , such that,
A.1. Proof of (A.1)
A.2. Proof of (A.2)
By using , as , and (A.4), it is easy to see that .
A.3. Proof of (A.3)
By using , as , and (A.6), it is easy to see that .
The converse proof of Theorem 1 is completed.
B. Direct Proof of Theorem 1
The direct part (achievability) of Theorem 1 is proven by considering the following two cases.
- Case 1: If , we need to show that is achievable, where .
- Case 2: If , we need to show that is achievable.
The direct proof of Theorem 1 is organized as follows. The balanced coloring lemma introduced by Ahlswede and Cai is provided in Subsection B.1, and it will be used in the remainder of this section. The code-book generation is shown in Subsection B.2, and the equivocation analysis is given in Subsection B.3.
B.1. The Balanced Coloring Lemma
The balanced coloring lemma was first introduced by Ahlswede and Cai; see the following.
Lemma 1. Balanced coloring lemma: For all , , , , sufficiently large N and all N-type , there exists a γ-coloring of such that for all joint N-type with marginal distribution and , ,
for , where is the inverse image of c.
Proof. Letting , Lemma 1 is directly from p. 259 of [], and thus, we omit it here. ☐
Lemma 1 shows that if and are joint typical, for given , the number of for a certain color k (), which is denoted as , is upper bounded by . By using Lemma 1, it is easy to see that the typical set maps into at least:
colors. On the other hand, the typical set maps into at most γ colors.
B.2. Code-Book Generation
Fix the joint probability mass function . The message set satisfies:
Let .
The block Markov encoding scheme is used in the direct proof of Theorem 1. The random vectors , , , and consist of n blocks of length N. Let , , and () be the random vectors for block i. Define , , and to be the specific vectors for all blocks. The message for all n blocks is denoted by , where () is uniformly distributed over the alphabet , and is independent of ( and ). Note that does not exist.
Construction of :
Gel’fand and Pinsker’s binning and block Markov coding scheme are used in the construction of .
- Construction of for Case 1:For each block, generate () i.i.d. sequences of , according to . Partition these sequences at random into bins, such that each bin has sequences. Index each bin by .Denote the message () by , where and . Here, note that is independent of .In the first block, for a given side information , try to find a , such that . If multiple sequences exist, randomly choose one for transmission. If there is no such sequence, declare an encoding error.For the i-th block (), the transmitter receives the output of the -th block; he or she gives up if ( as ). It is easy to see that the probability for giving up at the -th block tends to zero as . In the case , generate a mapping . Define a random variable by (), and it is uniformly distributed over the set . is independent of . Reveal the mapping to the legitimate receiver, the wiretapper and the transmitter. Then, since the transmitter gets , he computes . For a given (), the transmitter selects a sequence in the bin (where ⊕ is the modulo addition over ), such that . If multiple sequences in bin exist, choose the sequence with the smallest index in the bin. If there is no such sequence, declare an encoding error. Here, note that since is independent of , is independent of and . The proof is given as follows.Proof. Since:and:it is easy to see that , which implies that is independent of .Analogously, we can prove that , which implies that is independent of . Thus, the proof of is independent of , and is completed.☐
- Construction of for Case 2: The construction of for Case 2 is similar to that of Case 1, except that there is no need to divide into two parts. The detail is as follows. For the i-th block (), if , generate a mapping (note that ). Let (), and it is uniformly distributed over the set . is independent of . Reveal the mapping to the legitimate receiver, the wiretapper and the transmitter. When the transmitter receives the feedback of the -th block, he or she computes . For a given transmitted message (), the transmitter selects a codeword in the bin (where ⊕ is the modulo addition over ), such that . If multiple sequences in bin exist, select the one with the smallest index in the bin. If there is no such sequence, declare an encoding error. Here, note that is independent of and , and the proof is similar to that of Case 1. Thus, we omit the proof here.
Construction of :
In each block, the channel input is generated by a pre-fixed discrete memoryless channel with transition probability . The inputs of the channel are and , and the output is .
Here, note that for Case 1, the random vector of block i () is i.i.d. generated corresponding to the encrypted message and (here, is also i.i.d. generated according to the probability mass function ). Since and are generated according to , and the discrete memoryless channel, the only connection between of the i-th block and of the -th block is the secret key , which is generated by . As stated above, both the encrypted message and the real message are independent of , and thus, of the i-th block are independent of of the -th block. Since and are also independent of and ( and ), it is easy to see that are independent of . Finally, note that () is independent of (generated by ); thus, are independent of .
Analogously, in Case 2, for and , the fact that are independent of and also holds.
Decoding: For block i (), given a vector , try to find a sequence (Case 1) or (Case 2), such that and are joint typical. If there exists a unique sequence, put out the corresponding index of the bin or . Otherwise, declare a decoding error. Since the legitimate receiver has , put out the corresponding from or .
B.3. Proof of Achievability
Here, note that the above encoding-decoding scheme for the achievability proof of Theorem 1 is exactly the same as that in [], except that the transmitter transmits an “encrypted message” by using the secret key . Since the legitimate receiver has , the decoding scheme for the achievability proof of Theorem 1 is in fact the same as that in []. Hence, we omit the proof of here. It remains to prove that ; see the following.
- For Case 1, part of the message is encrypted by . In the analysis of the equivocation, we drop from . Then, the equivocation about is equivalent to the equivocation about . Since , the wiretapper tries to guess from . Note that for a given and sufficiently large N, . Thus, the wiretapper can guess from the conditional typical set . By using the above Lemma 1 and (B.2), the set maps into at least (here, ) (colors). Thus, in the i-th block, the uncertainty about is bounded by:Here, note that is uniformly distributed.
- For Case 2, the alphabet of the secret key equals the alphabet , and the encrypted message is denoted by . Then, by using the above Lemma 1 and (B.2), the set maps into at least (here, ) (colors). Thus, in the i-th block, the uncertainty about is bounded by:
Letting and , it is easy to see that:
The proof of for Case 1 is completed.
Proof of for Case 2:
where (a) is from (proven in the remainder of this section), (b) is from (proven in the remainder of this section), (c) follows from the fact that is independent of and and (d) is from (B.7).
Letting and , it is easy to see that:
The proof of for Case 2 is completed.
It remains to prove the Markov chains and of the proof of for Case 1 and , of the proof of for Case 2.
Proof. Proof of for Case 1:
For convenience, we denote the probability by .
It remains to calculate the joint probabilities in (B.13); see the following.
where (a) is from the fact that are independent of , (b) is from the fact that is independent of for all of the and , (c) is from the fact that given , , and , is uniquely determined, and (d) follows from the fact that , , ..., are independent.
Replacing i by , the joint probability can be calculated by:
where (e) follows from (B.14) (replacing i by ).
Next, we need to calculate the right-hand side of (B.13); see the following.
where (1) is from the fact that and are independent of .
The joint probability is calculated by:
where (1) is from the fact that is independent of .
Proof. Proof of for Case 1:
It remains to calculate the joint probabilities in (B.21); see the following.
where (a) is from the fact that is independent of , , and and is independent of , , .
Similarly, we have:
where (b) is from the fact that is independent of , and .
Next, we need to calculate the right-hand side of (B.21); see the following.
where (c) is from the fact that , , and are independent.
The joint probability is calculated by:
where (d) is from the fact that , and are independent.
Proof. Proof of for Case 2:
Letting and for all , the proof of for Case 2 is along the lines of that for Case 1, and therefore, we omit it here. ☐
Proof. Proof of for Case 2:
Letting and for all , the proof of for Case 2 is along the lines of that for Case 1, and therefore, we omit it here. ☐
Thus, the direct proof of Theorem 1 is completed.
References
- Ahlswede, R.; Cai, N. Transmission, Identification and Common Randomness Capacities for Wire-Tap Channels with Secure Feedback from the Decoder. In General Theory of Information Transfer and Combinatorics; Springer-Verlag: Berlin/Heidelberg, Germany, 2006; Volume 4123, pp. 258–275. [Google Scholar]
- Dai, B.; Vinck, A.J.H.; Luo, Y.; Zhuang, Z. Capacity region of non-degraded wiretap channel with noiseless feedback. In Proceedings of 2012 IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012.
- Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Ardestanizadeh, E.; Franceschetti, M.; Javidi, T.; Kim, Y. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory 2009, 55, 5353–5361. [Google Scholar] [CrossRef]
- Lai, L.; El Gamal, H.; Poor, H.V. The wiretap channel with feedback: Encryption over the channel. IEEE Trans. Inf. Theory 2008, 54, 5059–5067. [Google Scholar] [CrossRef]
- He, X.; Yener, A. The role of feedback in two-way secure communication. IEEE Trans. Inf. Theory 2013, 59, 8115–8130. [Google Scholar] [CrossRef]
- Bassi, G.; Piantanida, P.; Shamai, S. On the capacity of the wiretap channel with generalized feedback. In Processdings of 2015 IEEE International Symposium on Information Theory, Hong Kong, China, 14–19 June 2015.
- Mitrpant, C.; Vinck, A.J.H.; Luo, Y. An achievable region for the gaussian wiretap channel with side information. IEEE Trans. Inf. Theory 2006, 52, 2181–2190. [Google Scholar] [CrossRef]
- El-Halabi, M.; Liu, T.; Georghiades, C.N.; Shamai, S. Secret writing on dirty paper: A deterministic view. IEEE Trans. Inf. Theory 2012, 58, 3419–3429. [Google Scholar] [CrossRef]
- Chen, Y.; Vinck, A.J.H. Wiretap channel with side information. IEEE Trans. Inf. Theory 2008, 54, 395–402. [Google Scholar] [CrossRef]
- Gel’fand, S.I.; Pinsker, M.S. Coding for channel with random parameters. Probl. Control Inf. Theory 1980, 9, 19–31. [Google Scholar]
- Dai, B.; Luo, Y. Some new results on wiretap channel with side information. Entropy 2012, 14, 1671–1702. [Google Scholar] [CrossRef]
- Chia, Y.K.; El Gamal, A. Wiretap channel with causal state information. IEEE Trans. Inf. Theory 2012, 58, 2838–2849. [Google Scholar] [CrossRef]
- Liu, T.; Mukherjee, P.; Ulukus, S.; Lin, S.; Hong, Y.W.P. Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere. IEEE Trans. Wireless Commun. 2015, 14, 2655–2669. [Google Scholar] [CrossRef]
- Csiszár, I.; Körner, J. Information Theory: Coding Theorems for Discrete Memoryless Systems; Academic Press: New York, NY, USA, 1981; pp. 123–124. [Google Scholar]
- Csiszár, I.; Körner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar]
- Gamal, A.E.; Kim, Y.H. Network Information Theory; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
- Costa, M.H.M. Writing on dirty paper. IEEE Trans. Inf. Theory 1983, 29, 439–441. [Google Scholar] [CrossRef]
- Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
- Leung-Yan-Cheong, S.; Hellman, M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
© 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).