Non-Adaptive Coding for Two-Way Wiretap Channel With or Without Cost Constraints
This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing non-adaptive coding, we analyze the information leakage and the decoding error probability, and derive inner bounds on the secrecy capacity regions fo...
Saved in:
| Published in: | IEEE transactions on information theory Vol. 70; no. 7; pp. 4611 - 4633 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
IEEE
01.07.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 0018-9448, 1557-9654 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing non-adaptive coding, we analyze the information leakage and the decoding error probability, and derive inner bounds on the secrecy capacity regions for the TW-WC under strong joint and individual secrecy constraints. For the TW-WC without cost constraint, both the secrecy and error exponents could be characterized by the conditional Rényi mutual information in a concise and compact form. And, some special cases secrecy capacity region and sum-rate capacity results are established, demonstrating that adaption is useless in some cases or the maximum sum-rate that could be achieved by non-adaptive coding. For the TW-WC with cost constraint, we consider the peak cost constraint and extend our secrecy results by using the constant composition codes. Accordingly, we characterize both the secrecy and error exponents by a modification of Rényi mutual information, which yields inner bounds on the secrecy capacity regions for the general discrete memoryless TW-WC with cost constraint. Our method works even when a pre-noisy processing is employed based on a conditional distribution in the encoder and can be easily extended to other multi-user communication scenarios. |
|---|---|
| AbstractList | This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing non-adaptive coding, we analyze the information leakage and the decoding error probability, and derive inner bounds on the secrecy capacity regions for the TW-WC under strong joint and individual secrecy constraints. For the TW-WC without cost constraint, both the secrecy and error exponents could be characterized by the conditional Rényi mutual information in a concise and compact form. And, some special cases secrecy capacity region and sum-rate capacity results are established, demonstrating that adaption is useless in some cases or the maximum sum-rate that could be achieved by non-adaptive coding. For the TW-WC with cost constraint, we consider the peak cost constraint and extend our secrecy results by using the constant composition codes. Accordingly, we characterize both the secrecy and error exponents by a modification of Rényi mutual information, which yields inner bounds on the secrecy capacity regions for the general discrete memoryless TW-WC with cost constraint. Our method works even when a pre-noisy processing is employed based on a conditional distribution in the encoder and can be easily extended to other multi-user communication scenarios. |
| Author | Hayashi, Masahito Chen, Yanling |
| Author_xml | – sequence: 1 givenname: Masahito orcidid: 0000-0003-3104-1000 surname: Hayashi fullname: Hayashi, Masahito email: masahito@math.nagoya-u.ac.jp organization: School of Data Science, The Chinese University of Hong Kong Shenzhen, Longgang, Shenzhen, China – sequence: 2 givenname: Yanling orcidid: 0000-0003-1603-9121 surname: Chen fullname: Chen, Yanling email: yanling.chen@volkswagen-infotainment.com organization: Volkswagen Infotainment GmbH, Bochum, Germany |
| BookMark | eNpNkL1PwzAQxS1UJNrCzsAQiTnF34nHKuKjUgUMQR0tN73QVMUOtgvqf4-jdmC5p7t77076TdDIOgsI3RI8IwSrh3pRzyimbMYYZ0zSCzQmQhS5koKP0BhjUuaK8_IKTULYpZYLQsfo_dXZfL4xfex-IKvcprOfWet8Vv-6fGWO2arzEE2fVVtjLexTH7dZ2g_qDjFFwlBsiN50NoZrdNmafYCbs07Rx9NjXb3ky7fnRTVf5g3lIuaNEE1TtoXkag0guVG0EVQULcNFyZoCAJdKpqkChkEYxZRp1yVISjcU2oJN0f3pbu_d9wFC1Dt38Da91AxLJUlJ2eDCJ1fjXQgeWt377sv4oyZYD9x04qYHbvrMLUXuTpEOAP7ZmcSlYOwPnZFqSQ |
| CODEN | IETTAW |
| Cites_doi | 10.1063/1.4964755 10.1109/TIT.2019.2904500 10.1109/ISIT50566.2022.9834450 10.1109/TIT.2006.871040 10.1109/TIFS.2011.2158422 10.1109/TIT.2019.2919295 10.1007/978-3-662-49725-8 10.1109/ISIT.2017.8006564 10.1109/ISIT.2013.6620735 10.1109/TIT.2013.2295596 10.1109/TIT.2013.2281716 10.1109/TIFS.2018.2818067 10.1109/TIT.2013.2281711 10.1109/TIT.1978.1055917 10.1109/TIT.2020.3039916 10.1109/TIT.1984.1056847 10.1109/ISIT.2007.4557345 10.1016/S0019-9958(79)90753-8 10.1109/ISIT.2016.7541620 10.1109/TIT.2022.3150754 10.1109/TIT.2014.2355811 10.3390/e25050741 10.1109/TIT.2018.2885318 10.1109/ISIT.2014.6874974 10.1109/itw44776.2019.8989099 10.1017/CBO9780511921889 10.1109/ISIT.2018.8437827 10.1002/j.1538-7305.1949.tb00928.x 10.1007/978-3-7091-2945-6 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TIT.1983.1056661 10.1109/TIT.2011.2110950 10.1109/TIT.2008.921680 10.1109/18.661498 10.1109/TIT.2016.2530088 10.1109/TIT.1965.1053768 10.1109/TIT.2017.2776900 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TIT.2023.3343362 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1557-9654 |
| EndPage | 4633 |
| ExternalDocumentID | 10_1109_TIT_2023_3343362 10360853 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 62171212 funderid: 10.13039/501100001809 |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c245t-c55cc8f7649bee64a92c5257f30783c7ee0896a929e30e5a939afb8e622d2ef73 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001253773500012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0018-9448 |
| IngestDate | Sun Nov 09 07:58:45 EST 2025 Sat Nov 29 03:31:51 EST 2025 Wed Aug 27 02:06:05 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c245t-c55cc8f7649bee64a92c5257f30783c7ee0896a929e30e5a939afb8e622d2ef73 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-3104-1000 0000-0003-1603-9121 |
| PQID | 3069618237 |
| PQPubID | 36024 |
| PageCount | 23 |
| ParticipantIDs | crossref_primary_10_1109_TIT_2023_3343362 ieee_primary_10360853 proquest_journals_3069618237 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-07-01 |
| PublicationDateYYYYMMDD | 2024-07-01 |
| PublicationDate_xml | – month: 07 year: 2024 text: 2024-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on information theory |
| PublicationTitleAbbrev | TIT |
| PublicationYear | 2024 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref32 ref2 ref39 ref16 ref38 ref19 Qi (ref18) 2017 Shannon (ref1); 1 ref24 ref23 ref26 ref25 Qi (ref17) ref20 ref41 ref22 ref21 Csiszár (ref10) 1996; 32 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
| References_xml | – volume: 32 start-page: 48 issue: 1 year: 1996 ident: ref10 article-title: Almost independence and secrecy capacity publication-title: Problemy Peredachi Inf. – ident: ref35 doi: 10.1063/1.4964755 – ident: ref27 doi: 10.1109/TIT.2019.2904500 – ident: ref32 doi: 10.1109/ISIT50566.2022.9834450 – ident: ref11 doi: 10.1109/TIT.2006.871040 – ident: ref19 doi: 10.1109/TIFS.2011.2158422 – ident: ref34 doi: 10.1109/TIT.2019.2919295 – ident: ref36 doi: 10.1007/978-3-662-49725-8 – ident: ref7 doi: 10.1109/ISIT.2017.8006564 – ident: ref5 doi: 10.1109/ISIT.2013.6620735 – start-page: 626 volume-title: Proc. Int. Symp. Inf. Theory Its Appl. (ISITA) ident: ref17 article-title: One-sided secrecy over the two-way wiretap channel – ident: ref33 doi: 10.1109/TIT.2013.2295596 – ident: ref15 doi: 10.1109/TIT.2013.2281716 – ident: ref16 doi: 10.1109/TIFS.2018.2818067 – ident: ref14 doi: 10.1109/TIT.2013.2281711 – ident: ref23 doi: 10.1109/TIT.1978.1055917 – ident: ref28 doi: 10.1109/TIT.2020.3039916 – ident: ref4 doi: 10.1109/TIT.1984.1056847 – ident: ref12 doi: 10.1109/ISIT.2007.4557345 – ident: ref2 doi: 10.1016/S0019-9958(79)90753-8 – ident: ref6 doi: 10.1109/ISIT.2016.7541620 – volume: 1 start-page: 611 volume-title: Proc. 4th Berkeley Symp. Math., Statist., Probab. ident: ref1 article-title: Two-way communication channels – ident: ref40 doi: 10.1109/TIT.2022.3150754 – ident: ref25 doi: 10.1109/TIT.2014.2355811 – ident: ref29 doi: 10.3390/e25050741 – ident: ref39 doi: 10.1109/TIT.2018.2885318 – ident: ref26 doi: 10.1109/ISIT.2014.6874974 – ident: ref20 doi: 10.1109/itw44776.2019.8989099 – ident: ref30 doi: 10.1017/CBO9780511921889 – ident: ref31 doi: 10.1109/ISIT.2018.8437827 – ident: ref8 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref22 doi: 10.1007/978-3-7091-2945-6 – ident: ref9 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref3 doi: 10.1109/TIT.1983.1056661 – ident: ref38 doi: 10.1109/TIT.2011.2110950 – ident: ref13 doi: 10.1109/TIT.2008.921680 – year: 2017 ident: ref18 article-title: Achieving both positive secrecy rates of the users in two-way wiretap channel by individual secrecy publication-title: arXiv:1707.05930 – ident: ref41 doi: 10.1109/18.661498 – ident: ref21 doi: 10.1109/TIT.2016.2530088 – ident: ref24 doi: 10.1109/TIT.1965.1053768 – ident: ref37 doi: 10.1109/TIT.2017.2776900 |
| SSID | ssj0014512 |
| Score | 2.4713283 |
| Snippet | This paper studies the secrecy results for the two-way wiretap channel (TW-WC) with an external eavesdropper under a strong secrecy metric. Employing... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 4611 |
| SubjectTerms | Additives Channel coding Codes Coding constant composition codes Costs Decoding Electronic surveillance error exponent Exponents Information leakage Jamming Mutual information R\'enyi mutual information two-way channel Wiretapping |
| Title | Non-Adaptive Coding for Two-Way Wiretap Channel With or Without Cost Constraints |
| URI | https://ieeexplore.ieee.org/document/10360853 https://www.proquest.com/docview/3069618237 |
| Volume | 70 |
| WOSCitedRecordID | wos001253773500012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1557-9654 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014512 issn: 0018-9448 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR27TsMw8ASIAQYeBUShIA8sDCmJ7djxWFVUsFQdimCLHPcikFBStSmIv-ecpAiEGFjy9im68935fC-Aq9wgTRwVBtwZv1sVy8AqjALicUfiMNY6snWzCT0eJ09PZtImq9e5MIhYB59h31_WvvxZ6VZ-q4w4nKCSftmETa1Vk6z15TKQcdSUBo-Ig8noWPskQ3MzvZ_2fZvwvhBSCMV_6KC6qcovSVyrl9H-P3_sAPbadSQbNIQ_hA0sOrC_7tHAWpbtwO63goNHMBmXRTCY2bkXcmxYesXFaNnKpu9l8Gg_mA-Greyc-aSDAl_pvnpm9N6fy1VFQ5b-4MvO2peiWh7Dw-h2OrwL2p4KgeMyrgIXx84luVbSZIhKWsOdL4iaC-_PcxoxTIyipwZFiLE1wtg8S1BxPuOYa3ECW0VZ4CmwnGeRkM66SGcyyZ2J8sgphxZjskMw68L1GsvpvCmdkdYmR2hSokjqKZK2FOnCscfqt-8ahHaht6ZL2jLXMiXovk8NF_rsj2HnsEPQZRNW24OtarHCC9h2b9XLcnFZz5tPh0u__g |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlR3LToQwcOIrUQ--jeuzBy8eWKEPoEdjNLtRNx4weiOlO8RNDGxcVuPfOwXWaIwHL0CBFjLTmel0XgCnuUaaOKHvcavdbpWSngkx8IjGLbFDFUWBqYtNRINB_PSk79tg9ToWBhFr5zPsusvalj8s7dRtlRGF06gkX-ZhUUnJ_SZc68toIFXQJAcPiIZJ7ZhZJX19nvSTrisU3hVCChHyH1KoLqvyixfXAuZ6_Z-_tgFr7UqSXTSo34Q5LLZgfValgbVEuwWr31IObsP9oCy8i6EZOzbHLksnuhgtXFnyXnqP5oM5d9jKjJkLOyjwhdrVM6Pn7lxOK-oycQeXeNaMimqyAw_XV8llz2urKniWS1V5Vilr4zwKpc4QQ2k0ty4lai6cRc9GiH6sQ7qrUfiojBba5FmMIedDjnkkdmGhKAvcA5bzLBDSGhtEmYxzq4M8sKFFg4o0Ecw6cDaDcjpukmektdLh65QwkjqMpC1GOrDjoPrtvQagHTic4SVtyWuS0uiuUg0X0f4f3U5guZfc3aa3_cHNAazQl2TjZHsIC9XrFI9gyb5Vo8nrcT2HPgGv4cNF |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Non-Adaptive+Coding+for+Two-Way+Wiretap+Channel+With+or+Without+Cost+Constraints&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Hayashi%2C+Masahito&rft.au=Chen%2C+Yanling&rft.date=2024-07-01&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=70&rft.issue=7&rft.spage=4611&rft.epage=4633&rft_id=info:doi/10.1109%2FTIT.2023.3343362&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TIT_2023_3343362 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |