Non-Adaptive Coding for Two-Way Wiretap Channel With or Without Cost Constraints

This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing non-adaptive coding, we analyze the information leakage and the decoding error probability, and derive inner bounds on the secrecy capacity regions fo...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information theory Vol. 70; no. 7; pp. 4611 - 4633
Main Authors: Hayashi, Masahito, Chen, Yanling
Format: Journal Article
Language:English
Published: New York IEEE 01.07.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9448, 1557-9654
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing non-adaptive coding, we analyze the information leakage and the decoding error probability, and derive inner bounds on the secrecy capacity regions for the TW-WC under strong joint and individual secrecy constraints. For the TW-WC without cost constraint, both the secrecy and error exponents could be characterized by the conditional Rényi mutual information in a concise and compact form. And, some special cases secrecy capacity region and sum-rate capacity results are established, demonstrating that adaption is useless in some cases or the maximum sum-rate that could be achieved by non-adaptive coding. For the TW-WC with cost constraint, we consider the peak cost constraint and extend our secrecy results by using the constant composition codes. Accordingly, we characterize both the secrecy and error exponents by a modification of Rényi mutual information, which yields inner bounds on the secrecy capacity regions for the general discrete memoryless TW-WC with cost constraint. Our method works even when a pre-noisy processing is employed based on a conditional distribution in the encoder and can be easily extended to other multi-user communication scenarios.
AbstractList This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing non-adaptive coding, we analyze the information leakage and the decoding error probability, and derive inner bounds on the secrecy capacity regions for the TW-WC under strong joint and individual secrecy constraints. For the TW-WC without cost constraint, both the secrecy and error exponents could be characterized by the conditional Rényi mutual information in a concise and compact form. And, some special cases secrecy capacity region and sum-rate capacity results are established, demonstrating that adaption is useless in some cases or the maximum sum-rate that could be achieved by non-adaptive coding. For the TW-WC with cost constraint, we consider the peak cost constraint and extend our secrecy results by using the constant composition codes. Accordingly, we characterize both the secrecy and error exponents by a modification of Rényi mutual information, which yields inner bounds on the secrecy capacity regions for the general discrete memoryless TW-WC with cost constraint. Our method works even when a pre-noisy processing is employed based on a conditional distribution in the encoder and can be easily extended to other multi-user communication scenarios.
Author Hayashi, Masahito
Chen, Yanling
Author_xml – sequence: 1
  givenname: Masahito
  orcidid: 0000-0003-3104-1000
  surname: Hayashi
  fullname: Hayashi, Masahito
  email: masahito@math.nagoya-u.ac.jp
  organization: School of Data Science, The Chinese University of Hong Kong Shenzhen, Longgang, Shenzhen, China
– sequence: 2
  givenname: Yanling
  orcidid: 0000-0003-1603-9121
  surname: Chen
  fullname: Chen, Yanling
  email: yanling.chen@volkswagen-infotainment.com
  organization: Volkswagen Infotainment GmbH, Bochum, Germany
BookMark eNpNkL1PwzAQxS1UJNrCzsAQiTnF34nHKuKjUgUMQR0tN73QVMUOtgvqf4-jdmC5p7t77076TdDIOgsI3RI8IwSrh3pRzyimbMYYZ0zSCzQmQhS5koKP0BhjUuaK8_IKTULYpZYLQsfo_dXZfL4xfex-IKvcprOfWet8Vv-6fGWO2arzEE2fVVtjLexTH7dZ2g_qDjFFwlBsiN50NoZrdNmafYCbs07Rx9NjXb3ky7fnRTVf5g3lIuaNEE1TtoXkag0guVG0EVQULcNFyZoCAJdKpqkChkEYxZRp1yVISjcU2oJN0f3pbu_d9wFC1Dt38Da91AxLJUlJ2eDCJ1fjXQgeWt377sv4oyZYD9x04qYHbvrMLUXuTpEOAP7ZmcSlYOwPnZFqSQ
CODEN IETTAW
Cites_doi 10.1063/1.4964755
10.1109/TIT.2019.2904500
10.1109/ISIT50566.2022.9834450
10.1109/TIT.2006.871040
10.1109/TIFS.2011.2158422
10.1109/TIT.2019.2919295
10.1007/978-3-662-49725-8
10.1109/ISIT.2017.8006564
10.1109/ISIT.2013.6620735
10.1109/TIT.2013.2295596
10.1109/TIT.2013.2281716
10.1109/TIFS.2018.2818067
10.1109/TIT.2013.2281711
10.1109/TIT.1978.1055917
10.1109/TIT.2020.3039916
10.1109/TIT.1984.1056847
10.1109/ISIT.2007.4557345
10.1016/S0019-9958(79)90753-8
10.1109/ISIT.2016.7541620
10.1109/TIT.2022.3150754
10.1109/TIT.2014.2355811
10.3390/e25050741
10.1109/TIT.2018.2885318
10.1109/ISIT.2014.6874974
10.1109/itw44776.2019.8989099
10.1017/CBO9780511921889
10.1109/ISIT.2018.8437827
10.1002/j.1538-7305.1949.tb00928.x
10.1007/978-3-7091-2945-6
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TIT.1983.1056661
10.1109/TIT.2011.2110950
10.1109/TIT.2008.921680
10.1109/18.661498
10.1109/TIT.2016.2530088
10.1109/TIT.1965.1053768
10.1109/TIT.2017.2776900
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TIT.2023.3343362
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1557-9654
EndPage 4633
ExternalDocumentID 10_1109_TIT_2023_3343362
10360853
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 62171212
  funderid: 10.13039/501100001809
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c245t-c55cc8f7649bee64a92c5257f30783c7ee0896a929e30e5a939afb8e622d2ef73
IEDL.DBID RIE
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001253773500012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9448
IngestDate Sun Nov 09 07:58:45 EST 2025
Sat Nov 29 03:31:51 EST 2025
Wed Aug 27 02:06:05 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 7
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c245t-c55cc8f7649bee64a92c5257f30783c7ee0896a929e30e5a939afb8e622d2ef73
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-3104-1000
0000-0003-1603-9121
PQID 3069618237
PQPubID 36024
PageCount 23
ParticipantIDs crossref_primary_10_1109_TIT_2023_3343362
ieee_primary_10360853
proquest_journals_3069618237
PublicationCentury 2000
PublicationDate 2024-07-01
PublicationDateYYYYMMDD 2024-07-01
PublicationDate_xml – month: 07
  year: 2024
  text: 2024-07-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2024
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref32
ref2
ref39
ref16
ref38
ref19
Qi (ref18) 2017
Shannon (ref1); 1
ref24
ref23
ref26
ref25
Qi (ref17)
ref20
ref41
ref22
ref21
Csiszár (ref10) 1996; 32
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – volume: 32
  start-page: 48
  issue: 1
  year: 1996
  ident: ref10
  article-title: Almost independence and secrecy capacity
  publication-title: Problemy Peredachi Inf.
– ident: ref35
  doi: 10.1063/1.4964755
– ident: ref27
  doi: 10.1109/TIT.2019.2904500
– ident: ref32
  doi: 10.1109/ISIT50566.2022.9834450
– ident: ref11
  doi: 10.1109/TIT.2006.871040
– ident: ref19
  doi: 10.1109/TIFS.2011.2158422
– ident: ref34
  doi: 10.1109/TIT.2019.2919295
– ident: ref36
  doi: 10.1007/978-3-662-49725-8
– ident: ref7
  doi: 10.1109/ISIT.2017.8006564
– ident: ref5
  doi: 10.1109/ISIT.2013.6620735
– start-page: 626
  volume-title: Proc. Int. Symp. Inf. Theory Its Appl. (ISITA)
  ident: ref17
  article-title: One-sided secrecy over the two-way wiretap channel
– ident: ref33
  doi: 10.1109/TIT.2013.2295596
– ident: ref15
  doi: 10.1109/TIT.2013.2281716
– ident: ref16
  doi: 10.1109/TIFS.2018.2818067
– ident: ref14
  doi: 10.1109/TIT.2013.2281711
– ident: ref23
  doi: 10.1109/TIT.1978.1055917
– ident: ref28
  doi: 10.1109/TIT.2020.3039916
– ident: ref4
  doi: 10.1109/TIT.1984.1056847
– ident: ref12
  doi: 10.1109/ISIT.2007.4557345
– ident: ref2
  doi: 10.1016/S0019-9958(79)90753-8
– ident: ref6
  doi: 10.1109/ISIT.2016.7541620
– volume: 1
  start-page: 611
  volume-title: Proc. 4th Berkeley Symp. Math., Statist., Probab.
  ident: ref1
  article-title: Two-way communication channels
– ident: ref40
  doi: 10.1109/TIT.2022.3150754
– ident: ref25
  doi: 10.1109/TIT.2014.2355811
– ident: ref29
  doi: 10.3390/e25050741
– ident: ref39
  doi: 10.1109/TIT.2018.2885318
– ident: ref26
  doi: 10.1109/ISIT.2014.6874974
– ident: ref20
  doi: 10.1109/itw44776.2019.8989099
– ident: ref30
  doi: 10.1017/CBO9780511921889
– ident: ref31
  doi: 10.1109/ISIT.2018.8437827
– ident: ref8
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref22
  doi: 10.1007/978-3-7091-2945-6
– ident: ref9
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref3
  doi: 10.1109/TIT.1983.1056661
– ident: ref38
  doi: 10.1109/TIT.2011.2110950
– ident: ref13
  doi: 10.1109/TIT.2008.921680
– year: 2017
  ident: ref18
  article-title: Achieving both positive secrecy rates of the users in two-way wiretap channel by individual secrecy
  publication-title: arXiv:1707.05930
– ident: ref41
  doi: 10.1109/18.661498
– ident: ref21
  doi: 10.1109/TIT.2016.2530088
– ident: ref24
  doi: 10.1109/TIT.1965.1053768
– ident: ref37
  doi: 10.1109/TIT.2017.2776900
SSID ssj0014512
Score 2.4713283
Snippet This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Index Database
Publisher
StartPage 4611
SubjectTerms Additives
Channel coding
Codes
Coding
constant composition codes
Costs
Decoding
Electronic surveillance
error exponent
Exponents
Information leakage
Jamming
Mutual information
R\'enyi mutual information
two-way channel
Wiretapping
Title Non-Adaptive Coding for Two-Way Wiretap Channel With or Without Cost Constraints
URI https://ieeexplore.ieee.org/document/10360853
https://www.proquest.com/docview/3069618237
Volume 70
WOSCitedRecordID wos001253773500012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1557-9654
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014512
  issn: 0018-9448
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR27TsMw8ASIAQYeBUShIA8sDCmJ7djxWFVUsFQdimCLHPcikFBStSmIv-ecpAiEGFjy9im68935fC-Aq9wgTRwVBtwZv1sVy8AqjALicUfiMNY6snWzCT0eJ09PZtImq9e5MIhYB59h31_WvvxZ6VZ-q4w4nKCSftmETa1Vk6z15TKQcdSUBo-Ig8noWPskQ3MzvZ_2fZvwvhBSCMV_6KC6qcovSVyrl9H-P3_sAPbadSQbNIQ_hA0sOrC_7tHAWpbtwO63goNHMBmXRTCY2bkXcmxYesXFaNnKpu9l8Gg_mA-Greyc-aSDAl_pvnpm9N6fy1VFQ5b-4MvO2peiWh7Dw-h2OrwL2p4KgeMyrgIXx84luVbSZIhKWsOdL4iaC-_PcxoxTIyipwZFiLE1wtg8S1BxPuOYa3ECW0VZ4CmwnGeRkM66SGcyyZ2J8sgphxZjskMw68L1GsvpvCmdkdYmR2hSokjqKZK2FOnCscfqt-8ahHaht6ZL2jLXMiXovk8NF_rsj2HnsEPQZRNW24OtarHCC9h2b9XLcnFZz5tPh0u__g
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR3LToQwcOIrUQ--jeuzBy8eWKEPoEdjNLtRNx4weiOlO8RNDGxcVuPfOwXWaIwHL0CBFjLTmel0XgCnuUaaOKHvcavdbpWSngkx8IjGLbFDFUWBqYtNRINB_PSk79tg9ToWBhFr5zPsusvalj8s7dRtlRGF06gkX-ZhUUnJ_SZc68toIFXQJAcPiIZJ7ZhZJX19nvSTrisU3hVCChHyH1KoLqvyixfXAuZ6_Z-_tgFr7UqSXTSo34Q5LLZgfValgbVEuwWr31IObsP9oCy8i6EZOzbHLksnuhgtXFnyXnqP5oM5d9jKjJkLOyjwhdrVM6Pn7lxOK-oycQeXeNaMimqyAw_XV8llz2urKniWS1V5Vilr4zwKpc4QQ2k0ty4lai6cRc9GiH6sQ7qrUfiojBba5FmMIedDjnkkdmGhKAvcA5bzLBDSGhtEmYxzq4M8sKFFg4o0Ecw6cDaDcjpukmektdLh65QwkjqMpC1GOrDjoPrtvQagHTic4SVtyWuS0uiuUg0X0f4f3U5guZfc3aa3_cHNAazQl2TjZHsIC9XrFI9gyb5Vo8nrcT2HPgGv4cNF
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Non-Adaptive+Coding+for+Two-Way+Wiretap+Channel+With+or+Without+Cost+Constraints&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Hayashi%2C+Masahito&rft.au=Chen%2C+Yanling&rft.date=2024-07-01&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=70&rft.issue=7&rft.spage=4611&rft.epage=4633&rft_id=info:doi/10.1109%2FTIT.2023.3343362&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIT_2023_3343362
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon