On the Binary Input Gaussian Wiretap Channel with / without Output Quantization

In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian wiretap channel is derived for the case when both the legitimate receiver and the eavesdropper have unquantized outputs. In particular, computable tight upper and lower bounds on the secrecy capacity are obtained. Theoretically, we prove that when the legitimate receiver has unquantized outputs while the eavesdropper has binary quantized outputs, the secrecy capacity is larger than that when both the legitimate receiver and the eavesdropper have unquantized outputs or both have binary quantized outputs. Further, numerical results show that in the low signal-to-noise ratio (SNR) (of the main channel) region, the secrecy capacity of the binary input Gaussian wiretap channel when both the legitimate receiver and the eavesdropper have unquantized outputs is larger than the capacity when both the legitimate receiver and the eavesdropper have binary quantized outputs; as the SNR increases, the secrecy capacity when both the legitimate receiver and the eavesdropper have binary quantized outputs tends to overtake.


Introduction
The capacity of the Gaussian channel with binary inputs is a particularly important metric on the performance of practical communication systems.If there exists an eavesdropper besides the legitimate users, the capacity of the Gaussian wiretap channel is usually studied from the perspective of information-theoretic secrecy.The concept of information-theoretic secrecy was first introduced by Shannon in [1], where he proposed a cipher system with perfect secrecy to ensure the confidentiality of communication.Later, Wyner introduced a wiretap channel in [2] to achieve the information-theoretic secrecy under a weak secrecy constraint (i.e., the rate of information leaked to the eavesdropper is made vanishing).In [3], Csiszár and Körner extended Wyner's work to a general broadcast channel model with one common message and one confidential message.
In the Gaussian wiretap channel, a wiretapper eavesdrops the communication through another Gaussian channel.Recently, the Gaussian wiretap channel with constrained/finite inputs has attracted increasing research attention [4][5][6][7][8].The closed-form expression of the secrecy capacity of the Gaussian wiretap channel with continuous input signal was given in [9].The work in [4] considered the Gaussian wiretap channel with M-ary pulse amplitude modulation (M-PAM) inputs and established the necessary conditions for the input power allocation and the input distribution in order to maximize the achievable secrecy rate.The effects of finite-alphabet inputs on the achievable secrecy rate of the multi-antenna wiretap systems were investigated in [5,6].
In this paper, two constraints are imposed on the Gaussian wiretap channel: the input signal is binary; the output is restricted to the binary quantized output and the unquantized output.Roughly speaking, the unquantized output is the original continuous channel output signal, while the binary quantized output is obtained from the binary quantization of the original continuous channel output.In the binary-input Gaussian wiretap channel (BI-GWC), since the legitimate receiver and the wiretapper can have either binary quantized outputs or unquantized outputs, there are four cases under consideration: 1.Both the legitimate receiver and the wiretapper have unquantized outputs; 2. Both the legitimate receiver and the wiretapper have binary quantized outputs; 3. The legitimate receiver has binary quantized outputs, while the wiretapper has unquantized outputs; 4. The legitimate receiver has unquantized outputs, while the wiretapper has binary quantized outputs.
So far, all the known works about BI-GWC [4][5][6] focus on Case 1, where the classical results in [2,3,9] were used to optimize the input power and the input distribution.However, no closed-form expression was derived.For the other three cases, their secrecy capacities have not yet been studied.In this paper, for Case 1, we give a close-form expression of the secrecy capacity.To reduce the computational complexity, tight upper and lower bounds on the secrecy capacity are also obtained.For Case 2, we transform the channel to a binary symmetric wiretap channel, and hence obtain its secrecy capacity.For Cases 3 and 4, we derive lower bounds on the secrecy capacity, respectively.
Moreover, it is known that the quantized output leads to a lower channel capacity than the unquantized output does for the binary input Gaussian channel [10].However, in the binary-input Gaussian wiretap channel, the problem is whether quantized output would still lead to a lower secrecy capacity.In this paper, we investigate this problem by comparing the secrecy capacities of these four cases.We theoretically prove that secrecy capacity for Case 4 is larger than those of Cases 1 and 2. Further, we observe from the numerical results that the secrecy capacity for Case 1 is larger than that for Case 2 in the low signal-to-noise ratio (SNR) (main channel) region; however, the later tends to overtake when SNR increases.In other words, unlike the binary-input Gaussian Channel, the impact of quantization of the output signal becomes insignificant in the high SNR region for Cases 1 and 2 of binary-input Gaussian wiretap channel.
The rest of the paper is organized as follows.Firstly, the system model of the binary-input Gaussian wiretap channel is introduced in Section 2. Next, the secrecy capacities of the four cases are studied in Section 3, and the numerical results are demonstrated in Section 4 respectively.Finally, the conclusion is given in Section 5.

Gaussian Channel with Binary Inputs
The model of Gaussian channel with binary input is shown in Figure 1.Let X ∈ {+ √ p, − √ p} be the binary input of the channel, where p is the signal power constraint.The channel output is described by where N is a Gaussian noise with variance σ 2 , and N is independent of the channel input X.Without loss of generality, we assume that N is zero-mean; i.e., N ∼ N (0, σ 2 ).Denote the signal-to-noise ratio (SNR) between the input signal and noise as γ p/σ 2 .
Y (unquantized output) In particular, we restrict to two output schemes: 1. Unquantized outputs: If the channel output signal is directly processed by the receiver without binary quantization as shown in Figure 1, we call it the unquantized output.The channel output Y is a continuous signal, having the conditional probability density function ].
With the unquantized output, a closed-form expression of the channel capacity for the BI-GWC was given in [11] as where 2 dx.This channel capacity C B (γ) is achieved if and only if the input signal is uniformly distributed [11].
For the sake of simplifying computation in what follows, the channel capacity can be approximated by keeping the first m terms of the summation as [11] (2)

Binary quantized outputs:
Through a binary quantization, the binary quantized output is where Y is the original continuous channel output signal.
In fact, this case can be modeled as the a binary symmetric channel with transition probability [10].By means of the results for binary symmetric channel [12], we can obtain the channel capacity for the BI-GWC with binary quantized outputs as where h(•) is the binary entropy function.Note that C H (γ) is achieved iff the binary input distribution is uniform [12].

Gaussian Wiretap Channel with Binary Inputs
The binary-input Gaussian wiretap channel is shown in Figure 2, where an external wiretapper eavesdrops the communication through another Gaussian channel.The channel output Y at the legitimate receiver and the channel output Z at the eavesdropper are described by where X is the antipodal transmission signal; N 1 and N 2 are the additive Gaussian noises of the main channel and the wiretap channel, respectively.Without loss of generality, we assume that N 1 and N 2 are zero-mean, and Then, the SNR of the legitimate channel and the wiretap channel are γ 1 and γ 2 , respectively.Particularly, we only consider γ 2 < γ 1 , since a reliable and secure communication is possible only in this case [9].

BI-GWC with/without Output Quantization
In this section, we study the secrecy capacities of the four cases mentioned in Section 1, which are denoted by C SS , C HH , C HS , and C SH , respectively.Since only if both the legitimate receiver and the eavesdropper have unquantized outputs or both have binary quantized outputs, the original channel is a stochastically degraded Gaussian wiretap channel (detailed explanation to follow).Then, we investigate the secrecy capacity of the four cases in two groups.

Both the Legitimate Receiver and the Eavesdropper Have Unquantized Outputs or Both Have Binary Quantized Outputs
If both the legitimate receiver and the eavesdropper have unquantized outputs, the difference between the channel output Y and Z is caused by the the additive Gaussian noise N 1 and N 2 .According to the assumption γ 2 < γ 1 , the wiretap channel output Z is stochastically degraded of the main channel output Y, which means that there exists a Z such that X → Y → Z , where Z has the same conditional marginal distribution as Z; i.e., p Z |X = p Z|X .Hence, in this case, the binary-input Gaussian wiretap channel is a stochastically degraded binary-input Gaussian wiretap channel.
If the legitimate receiver and the eavesdropper have binary quantized outputs (as mentioned in Section 2.2), the main channel and the wiretap channel are equal to the corresponding binary symmetric channels with transition probability Q( √ γ 1 ) and Q( √ γ 2 ), respectively.Similarly, under this assumption γ 2 < γ 1 , this case can be modeled as a stochastically degraded binary symmetric wiretap channel.By means of the results of a stochastically degraded wiretap channel [2,3], we can obtain the secrecy capacities for these two cases, whose proof will given in Appendix A.
Theorem 1.If both the eavesdropper and the legitimate receiver have unquantized outputs or both have binary quantized outputs, the secrecy capacity of the binary-input Gaussian wiretap channel is where p X is the probability distribution of the input signals; p * X is the uniform input distribution.
Based on Theorem 1, we can derive their closed-form expressions in Sections 3.1.1and 3.1.2,respectively.

BI-GWC: Secrecy Capacity When the Legitimate Receiver and the Eavesdropper Have Unquantized Outputs
For this case, we first derive a closed-form expression for the secrecy capacity in the following theorem.
Theorem 2. When both the legitimate receiver and the eavesdropper have unquantized outputs, the secrecy capacity for the binary-input Gaussian wiretap channel is where C B (γ) is as defined in Equation (1).
Proof.Recall that the channel capacity of the binary-input Gaussian channel with unquantized outputs is achieved by uniform input distribution [11].This means I p * X (X; Y) = C B (γ 1 ) and I p * X (X; Z) = C B (γ 2 ).Following Theorem 1, we then have According to Theorem 2, we deduce the closed-form expression of the secrecy capacity C SS .However, C B (γ) contains a summation of infinite series, and so C SS does.In order to give a computable expression of the channel capacity, we make use of an approximation of C SS by Equation (2); i.e., Specifically, we study the behaviour of C  SS , m = 1, 2, . . ., respectively, as follows: In fact, Corollary 1 provides computable lower bounds and upper bounds on C SS with low computational complexity.Note from the Corollary 1, the series C m SS at an even/odd number m of summation terms results in a lower/upper bound on the channel capacity C SS , which can be arbitrarily tight provided that m is sufficiently large.As an illustration, in Section 4, we show the upper and the lower bound are very tight, even for m = 6, 7.

BI-GWC: Secrecy Capacity When the Legitimate Receiver and the Eavesdropper Have Binary Quantized Outputs
Note that there exists a method in [10] which can be used to transform a binary-input and binary quantized-output Gaussian channel into a binary symmetric channel.That is, under the assumption γ 2 < γ 1 , this case can be modeled as a stochastically degraded binary symmetric channel.Based on the results of a degraded binary symmetric wiretap channel [8], we get its secrecy capacity in the following theorem.Theorem 3. The secrecy capacity of the Gaussian channel with binary inputs and binary quantized outputs is where Q(a) ∞ a e − x 2 2 dx, and Q( √ γ 1 ) and Q( √ γ 2 ) are the transition probabilities of the equivalent binary symmetric channels of the main channel and the wiretap channel, respectively.

BI-GWC: Secrecy Capacity When the Legitimate Receiver Has Binary Quantized Outputs and the Eavesdropper Has Unquantized Outputs
In this case, the channel for the legitimate receiver is equal to a binary symmetric channel, whilst the channel for the eavesdropper remains a binary-input Gaussian channel.Since the channel cannot be seen as a degraded one, Theorem 1 is not suitable for this case.Then, we give a lower bound on the secrecy capacity base on the result of normal broadcast channel [3] as follows.
where |a| + = max{0, a}; (C HS ) lower denotes the lower bound on the secrecy capacity C HS ; and (a) follows from the fact that the uniform input distribution achieves the channel capacity of In this subsection, the case is considered when the legitimate receiver has unquantized outputs, whilst the eavesdropper has binary quantized outputs.As same as the above case, a lower bound on the secrecy capacity C SH can be given by where (C SH ) lower denotes the lower bound on the secrecy capacity C SH , and (a) follows from the fact that the uniform input distribution achieves the channel capacity of C B (γ 1 ) and C H (γ 2 ) [11,12].Based on the secrecy capacities and the lower bounds on the secrecy capacity derived for the four cases above, we are able to have the following comparison.
Proof.Recall that unquantized output leads to a higher channel capacity than quantized output does for the binary-input Gaussian channel [10]; i.e., C B (γ) > C H (γ) (γ is the SNR of the channel).Then, applying it to Equations ( 5), ( 7), (8), and (9), we have From this corollary, we see that when the legitimate receiver has unquantized outputs and the eavesdropper has binary quantized outputs, the secrecy capacity is larger than those when both the legitimate receiver and the eavesdropper have unquantized outputs or both have binary quantized outputs.This is because the unquantized output provides a higher channel capacity for the legitimate receiver while the binary quantized output leads to a lower wiretap channel capacity for the eavesdropper.
Note that when the legitimate receiver has binary quantized outputs and the eavesdropper has unquantized outputs, we give a lower bound (C HS ) lower on the secrecy capacity, and thus it is not sufficient to compare with the capacities of the other cases.In addition, it is also hard to compare C HH and C SS through the closed-form expression.The comparison of C HH and C SS will be given through numerical results in the next section.

Comparison of C SS , C HH , (C HS ) lower and (C SH ) lower
In this subsection, we give the numerical comparison of the secrecy capacity C SS , C HH , (C HS ) lower , and (C SH ) lower .Recall that γ 1 , γ 2 are the SNRs of the legitimate channel and the wiretap channel, respectively.Denote the SNR gap to be ∆γ = γ 1 − γ 2 .
First, in Figure 3, we evaluate the tightness of the upper and the lower bounds on C SS by plotting the approximation C SS is already quite small.This indicates that an accurate evaluation of C SS can be done with less computational complexity by only involving m ≥ 6 summation terms in SNR of the main channel--γ SS C SS (1) --upper bound C SS (2) --lower bound C SS (6) --lower bound C SS (7) --upper bound In Figure 4, we compare the C SS and C SS are plotted as an upper and a lower bound on C SS , respectively.Moreover, Figure 4 also depicts the approximations on (C HS ) lower and (C SH ) lower by m = 6, 7.All the curves are plotted with respect to γ 1 with γ 2 = ∆γ = γ 1 /2.From Figure 4, it is clear that (C SH ) lower -as a lower bound on C SH -is strictly larger than both C SS and C HH .(C HS ) lower -as a lower bound on C HS -is strictly smaller than both C SS and C HH .This confirms the result in Corollary 2. Further, we notice that there is a crossing point where C SS = C HH , and the secrecy capacity C SS is larger than C HH at low SNR; whilst as SNR increases, C HH overtakes C SS .This gives a rough numerical comparison of C SS and C HH .In the following subsection, we will give more details about the comparison of C SS and C HH .

Comparison from the Perspectives of SNR and SNR/bit
In this subsection, we look into the comparison of C SS and C HH from the perspectives of the SNR and the SNR per bit of the channel to the legitimate receiver.Following the numerical evaluations in the previous subsection, we use C SS to approximate C B (γ) and C SS , respectively.Figure 5 consists of two sub-figures to illustrate how the crossing point occurs as ∆γ = γ 1 /2.In Figure 5a, we plot the curves C (6) B (γ 1 ) and C H (γ 1 ), which are the capacity of the legitimate channel with unquantized outputs and with binary quantized outputs, respectively.Correspondingly, the capacity of the wiretap channel C B (γ 1 ), C H (γ 1 ), C SS ,C HH , ∆γ = γ 1 /2.
In Figure 5a, C B (γ 1 ), C B (γ 2 ), C H (γ 1 ), and C H (γ 2 ) increase with an increasing SNR γ 1 .However, this phenomenon does not apply to the secrecy capacities C SS and C HH in Figure 5b.In fact, as shown in Figure 5b, both C SS and C HH first increase and then decrease with an increasing γ 1 .In other words, unlike in the traditional communication scenario, increasing SNR does not always help to achieve a higher transmission rate when secrecy is also under consideration.The underlying cause is that C SS is the increase from C B (γ 2 ) to C B (γ 1 ), while C HH is the increase from C H (γ 2 ) to C H (γ 1 ).However, these two increases do not always result in the increase of C B (γ 1 ) − C B (γ 2 ) and C H (γ 1 ) − C H (γ 2 ).The crossing point occurs when these two increases C B (γ 1 ) − C B (γ 2 ) and C H (γ 1 ) − C H (γ 2 ) are the same.
Figure 6 shows the relation between energy and the secrecy capacity.The channel capacities C B (γ 1 ) and C H (γ 1 ), the secrecy capacities C SS and C HH are plotted against the SNR per bit for ∆γ = γ/2, 3γ/4.
Note that SNR per bit is the energy per bit to noise power spectral density ratio (i.e., E B /N 0 ), where E B is the average energy per information bit and N 0 /2 = σ 2 is the variance of Gaussian noise of the main channel.Since E B = P/R and the SNR = E S /σ 2 = P/σ 2 , SNR per bit = E B /N 0 is related to the SNR definition as follows: Comparing C SS with C B and comparing C HH with C H under the same value, it can be seen how much extra SNR per bit is needed when considering secrecy.For instance, as shown in Figure 6, to approach the channel capacity C B = 0.3 bps, the SNR per bit E B /N 0 = −0.6141dB is needed.While to approach the same secrecy capacity with the unquantized output (i.e., C SS = 0.3 bps), the SNR per bit E B /N 0 = 1.6095 dB is needed.Therefore, the secure communication comes with an additional cost of more than 2 dB.A similar behavior applies to the case when both the legitimate receiver and the eavesdropper have binary quantized outputs.
Besides, as shown in Figure 6, with respect to SNR per bit, C SS and C HH do not increase monotonically, and this phenomenon is the same as that in Figure 4. Interestingly, as SNR → ∞ (also E B /N 0 → ∞), we observe that C SS and C HH approach to zero as shown in Figure 6.The underlying reason is that both C B (γ) and C H (γ) approach to 1 bps for the high SNR region, irrespectively of unquantized or quantized outputs.
Furthermore, we denote R * to be the secrecy capacity and (E B /N 0 ) * to be the corresponding SNR per bit at the crossing point (C SS = C HH ).In Figure 6, we observe that R * increases with respect to ∆γ, while (E B /N 0 ) * decreases with respect to ∆γ.This indicates a reduction in energy cost per bit and an increase of the secrecy capacity in case of a weaker eavesdropper (which results in a larger ∆γ).
In addition, since C SS , C HH approach to 0 as E B /N 0 → ∞, for an admissible secrecy rate, there are two possible SNR per bit E B /N 0 to achieve it.For the sake of energy saving, a smaller E B /N 0 is of great interest.For instance, if the targeted secrecy rate is less than R * , then it is possible to achieve the secure communication with an SNR per bit smaller than (E B /N 0 ) * .

Conclusions
In this paper, we studied the secrecy capacity of the Gaussian wiretap channel under two practical constraints: (1) binary inputs; and (2) binary output quantization.Consequently, a closed-form expression for the secrecy capacity was derived when both the legitimate receiver and eavesdropper have unquantized outputs, and a tight upper and a lower bound on the secrecy capacity were obtained with less computational complexity.Besides, lower bounds were provided for other cases.Numerical results show the comparison of the secrecy capacities of the four cases, and provide insights into the energy cost for the secrecy.

Figure 1 .
Figure 1.The Gaussian channel with binary inputs and quantized/unquantized outputs.
SS , C HH , (C HS ) lower and (C SH ) lower .C

B (γ 2 )
and C H (γ 2 ) are also plotted.In Figure5b, the comparison of the secrecy capacities C SS and C HH are shown versus a series of γ 1 .