All articles published by MDPI are made immediately available worldwide under an open access license. No special
permission is required to reuse all or part of the article published by MDPI, including figures and tables. For
articles published under an open access Creative Common CC BY license, any part of the article may be reused without
permission provided that the original article is clearly cited. For more information, please refer to
https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature
Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for
future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive
positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world.
Editors select a small number of articles recently published in the journal that they believe will be particularly
interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the
most exciting work published in the various research areas of the journal.
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which is also called the dirty paper wiretap channel (DP-WTC), has been extensively studied in the literature. Recently, it has been shown that taking actions on the corrupted state interference of the DP-WTC (also called the action-dependent DP-WTC) helps to increase the secrecy capacity of the DP-WTC. Subsequently, it has been shown that channel feedback further increases the secrecy capacity of the action-dependent DP-WTC (AD-DP-WTC), and a sub-optimal feedback scheme is proposed for this feedback model. In this paper, a two-step hybrid scheme and a corresponding new lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback are proposed. The proposed new lower bound is shown to be optimal (achieving the secrecy capacity) and tighter than the existing one in the literature for some cases, and the results of this paper are further explained via numerical examples.
Dirty paper coding is one of the most important pre-coding schemes in wireless communications and has a wide range of applications in information hiding [1]. Dirty paper coding was first investigated by Costa in his well-known paper on the dirty paper channel (DPC) [2], where a corrupted Gaussian state interference of a white Gaussian channel is noncausally known at the transmitter and not available at the receiver. Costa showed that the capacity of the DPC equals the capacity of the same model without state interference, which indicates that though the receiver does not know the state interference, it can still be perfectly removed by using dirty paper coding.
Note that in [2], the channel state is assumed to be generated by nature. However, in some practical scenarios, the state is affected or controlled by the communication systems, e.g., in intelligent reflecting surface-aided communication systems, the state is formed in part by the reflecting phase shift which is actually controlled by the transceiver [3]. Such a case was first investigated by Weissman in his paper on the action-dependent dirty paper channel (AD-DPC) [4], where the corrupted state interference of the DPC is affected and noncausally known by the transmitter. In [4], a lower bound on the capacity of AD-DPC was proposed, and the capacity was fully determined in [5].
In recent years, the study of the above dirty paper channels under additional secrecy constraints has received a lot attention. Specifically, [6] studied the discrete memoryless wiretap channel with state interference noncausally known by the transmitter, and obtained upper and lower bounds on the secrecy capacity. The authors of [7] extended the model studied in [6] to the broadcast situation, and also provided bounds on the secrecy capacity region of this extended model. The authors of [8,9] studied the Gaussian case of [6], namely, the dirty paper wiretap channel, and proposed bounds on the secrecy capacity. Furthermore, [8,9] pointed out that the proposed secret dirty paper coding increases the secrecy capacity of the Gaussian wiretap channel [10]. The above works mainly adopted the tools in [11,12] for establishing the secrecy rate/capacity. Very recently, the authors of [13] studied the AD-DPC with an additional eavesdropper, which is also called the action-dependent dirty paper wiretap channel (AD-DP-WTC), and proposed lower and upper bounds on the secrecy capacity. Note that the capacity results given in [9,13] indicate that:
There is a penalty term between secrecy capacity and capacity of the same model without secrecy constraints.
If the eavesdropper’s channel is less noisy than the legitimate receiver’s, the secrecy capacity may equal zero, i.e., no positive rate can be guaranteed for secure communications.
Very recently, it has been shown that channel feedback is an effective way to enhance the secrecy capacities of the DP-WTC [14,15] and the multi-input multi-output (MIMO) X-channels [16]. In [16], it has been shown that feedback increases the secure degrees of freedom (SDoF) region of the MIMO X-channel with secrecy constraints, which indicates that feedback also enlarges the secrecy capacity of the same model, even if the eavesdropper’s channel is less noisy than the legitimate receiver’s. The authors of [14,15,16] mainly adopted the idea of a generating secret key from the channel feedback and using this key to encrypt the transmitted message. Subsequently, [13] showed that a variation of the classical Schalkwijk–Kailath (SK) feedback scheme [17] for the point-to-point white Gaussian channel achieves the secrecy capacity of the DP-WTC with noiseless feedback, and the secrecy capacity equals the capacity of the same model without secrecy constraints, i.e., to achieve perfect secrecy, no rate needs to be sacrificed even if the eavesdropper gains advantage over the legitimate receiver. In addition, the authors of [13] also proposed a sub-optimal SK type feedback scheme for the AD-DP-WTC with noiseless feedback (see Figure 1), i.e., this scheme achieves a lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback, and the secrecy capacity remains open.
In this paper, we derive a new lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback, which is based on a hybrid two-step feedback scheme. The proposed new lower bound is shown to be optimal and tighter than the existing one in the literature for some cases, and the results of this paper are further explained via numerical examples. The remainder of this paper is organized as follows. A formal definition of the model studied in this paper and previous results are introduced in Section 2. The main result and the corresponding proof are given in Section 3 and Section 4, respectively. Section 5 includes the summary of all results in this paper and discusses future work.
2. Model Formulation and Previous Results
2.1. Model Formulation
For the AD-DP-WTC with noiseless feedback (see Figure 1), the i-th () channel inputs and outputs are given by
where is the output of the channel encoder subject to an average power constraint P (), is the output of the action encoder subject to an average power constraint (), and are channel outputs, respectively, at the legitimate receiver and the eavesdropper, and , , are independent Gaussian noises and are independently identically distributed (i.i.d.) across the time index i. Note that , , and . The transmitted message M is uniformly drawn in its alphabet .
At time instant i (), a corrupted state interference is generated through a white Gaussian channel with i.i.d. noise and channel input , where is a (stochastic) function of the message M. Since the corrupted state interference is noncausally known by the channel encoder, the i-th channel input is a (stochastic) function of the message M, , and the feedback .
The legitimate receiver generates an estimation , where is the legitimate receiver’s decoding function, and the average decoding error probability equals
The eavesdropper’s equivocation rate of the message M is denoted by
A rate R is said to be achievable with perfect weak secrecy if for any and sufficiently large N, there exists a channel encoder–decoder such that
The secrecy capacity of the AD-DP-WTC with feedback, which is the maximum achievable secrecy rate defined in (4), is denoted by . A new lower bound, on , will be given in the next section.
2.2. SK Feedback Scheme for the Point-to-Point White Gaussian Channel
For the point-to-point white Gaussian channel with feedback, at time i (), channel input and output are given by
where is the channel input subject to an average power constraint P (), and is the i.i.d. channel noise. The channel input is a function of the message M and the feedback . It is well known that the capacity of the white Gaussian channel with feedback equals the capacity of the same model without feedback, i.e.,
The authors of [17] showed that the classical SK scheme achieves , and this scheme is described below.
Since M takes the values in , we divide the interval into equally spaced sub-intervals, and the center of each sub-interval is mapped to a message value in . Let be the center of the sub-interval with respect to (w.r.t.) the message M.
At time 1, the transmitter transmits
The receiver receives , and obtains an estimation of by computing
where , and .
At time k , the receiver obtains , and obtains an estimation of by computing
as . Recently, [18] showed that the above classical SK scheme, which is not designed with the consideration of secrecy, already achieves the secrecy capacity of the Gaussian wiretap channel with noiseless feedback, i.e., the corresponding secrecy capacity equals the capacity of the same model without secrecy constraints.
2.3. Previous Results on the AD-DP-WTC with Feedback
For the capacity of the AD-DP-WTC with feedback, [13] showed that it is bounded by
where
Note that is the capacity of the AD-DPC without feedback, and is given in [5].
Since the capacity of the AD-DP-WTC with feedback is no larger than that of the same model without secrecy constraints, and feedback does not increase the capacity of the AD-DPC [4], and serves as a trivial upper bound on . The lower bound is derived by constructing
for , and
for , where G is randomly generated according to and it is independent of A and W. Substituting (19) and (20) into (1), the AD-DP-WTC with feedback is equivalent to the Gaussian wiretap channel with feedback with input A, channel noise , channel output Y of the legitimate receiver, and the channel output Z of the eavesdropper. Directly applying the SK scheme introduced in the preceding subsection, we conclude that L is achievable. Moreover, from [18], we know that the SK scheme also achieves the secrecy capacity of the Gaussian wiretap channel with noiseless feedback, which indicates that L is achievable with perfect weak secrecy, and the proof is completed. □
Note that the above lower and upper bounds on do not meet in general, and exploring a tighter lower bound on is the motivation of this paper.
3. Main Results of this Paper
3.1. A New Lower Bound on the Secrecy Capacity of the AD-DP-WTC with Feedback
Theorem1.
A new lower bound on the secrecy capacity of the AD-DP-WTC with feedback is given by
Remark1.
Comparing the new lower bound in (21) with the upper bound in (16), it is easy to see that there still exists a gap between the two bounds due to the penalty term .
The following Corollary 1 shows that the proposed new lower bound in (21) is optimal for a special case. Moreover, the following Corollary 2 shows that the new lower bound in (21) is tighter than the existing lower bound in (16) when tends to infinity.
Corollary1.
For ,
which indicates that the secrecy capacity is determined for this case.
Proof.
Formula (22) is directly obtained by using (21) and letting . Hence the proof is completed. □
Corollary2.
where L is the existing lower bound defined in (18).
Proof.
Define the gap between the new lower bound in (21) and the existing lower bound in (18) by
For the case that the maximum is achieved when ,
For the case that the maximum is achieved when ,
Combining (25) and (26), we conclude that , which indicates that . The proof of Corollary 2 is completed. □
Proof Sketch of Theorem 1.
The main idea of the achievable scheme is briefly illustrated by Figure 2 and Figure 3. In Figure 2, we split the message M into two parts , where the sub-message is uniformly distributed in . The sub-message is available at both the action encoder and channel encoder, and the sub-message is only available at the channel encoder. Let , where is encoded as with power , is encoded as with power , , and for . Moreover, is also encoded as with power , and
which indicates that is a deterministic function of . □
The i-th () channel inputs and outputs are rewritten as
where is an i.i.d Gaussian noise process with zero mean and variance , and is subject to an average power constraint .
In Figure 3, since is known by the channel encoder, the codeword can be subtracted when applying an SK type feedback scheme to , i.e., the transmission of is through an equivalent channel with input , output
Moreover, since and are known by the channel encoder, and , can be viewed as state interference which is noncausally known at the encoder of the equivalent channel of (namely, the equivalent encoder of ).
In addition, the transmission of is through an equivalent channel with inputs , output , and channel noise , which is nonwhite Gaussian noise since is not i.i.d generated.
Then, applying an SK type scheme to , and Wyner’s random binning scheme [11] together with Feinstein’s greedy coding scheme [19] to , the lower bound in Theorem 1 is obtained. The detail of the proof is given in the next section.
3.2. Numerical Results
Figure 4 plots the upper bound, the existing lower bound and the new lower bound on the secrecy capacity of the AD-DP-WTC with feedback for , , , , and P taking values in . From Figure 4, we see that our new scheme performs better than the existing one when the noise variance is large enough.
Figure 5 plots the bounds for , , , , and P taking values in . From Figure 5, we see that our new lower bound almost meets the upper bound when the eavesdropper’s channel noise variance is large enough.
4. Proof of Theorem 1
The encoding and decoding procedure of Figure 3 is described below. Since takes values in , the interval [−0.5,0.5] is divided into equally spaced sub-intervals, and the center of each sub-interval is mapped to a message value. Let be the center of the sub-interval w.r.t. the message (the variance of approximately equals ). Let , where . Here, is the codeword of the sub-message and a dummy message , and it is generated by Feinstein’s greedy construction for the non-i.i.d. Gaussian channel [19]. Moreover, and are uniformly distributed in and , respectively.
Encoding procedure: Before the transmission, for a given sub-message , first, a dummy message is randomly chosen from its alphabet . Then, Feinstein’s greedy construction [19] is applied to encode the message pair as the codeword .
At time 1, the equivalent encoders of and , respectively, send
where
and will be defined later.
At time 2, once receiving the feedback , the equivalent encoder of computes
where and . The equivalent encoders of and , respectively, send (the first component of ) and
At time k (), once receiving the feedback , the equivalent encoder of computes
where and . The equivalent encoders of and , respectively, send (the -th component of ) and
Lemma1.
For , the general terms of and can be expressed as
Decoding procedure: The legitimate receiver does a two-step decoding scheme. First, by applying Feinstein’s decoding rule [19] to the decoding of . According to Feinstein’s lemma [19], the decoding error probability of and , denoted by , can be arbitrarily small if
where .
Second, after decoding , the legitimate receiver obtains for all , and subtracts from , then the legitimate receiver obtains .
At time 1, the legitimate receiver obtains and computes
At time k (), the legitimate receiver’s estimation of is given by
where , (a) follows from (34), and (b) follows from (39). From (40), we can conclude that for ,
Now we bound the decoding error probability of as follows. From and the definition of , we have
where following from is the tail of the unit Gaussian distribution evaluated at x, and is from Lemma 1. Since is decreasing while x is increasing, from (42), we can conclude that if
as N is large enough.
Note that the total decoding error probability of is upper bounded by . From the above analysis, we conclude that as N tends to infinity if (38) and (43) are guaranteed.
Equivocation analysis: We bound the equivocation rate as follows:
where follows from the Markov chain and , is due to the fact that is a deterministic function of , and follows from Fano’s inequality when the codeword is generated by Feinstein’s greedy construction [19], i.e., if
given , the eavesdropper’s decoding error probability of is arbitrarily small () as N tends to infinity, then using Fano’s inequality, we have
Formula (45) indicates that N is sufficiently large, if
where (a) follows from the fact that there is a one-to-one mapping between and , (b) follows from (28), (30), (33) and (A5), (c) follows from the fact that and are independent of , (d) follows from the fact that and are independent of each other, and (e) follows from , and the variance of equals as N tends to infinity.
where . Choosing sufficiently large N, is satisfied. Finally, combining (43) and (52), the lower bound in Theorem 1 is derived, and the proof is completed.
5. Conclusions and Future Work
This paper shows a new lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback by proposing a novel two-step hybrid feedback scheme. The numerical result shows that when the noise variance is large enough, our new feedback scheme performs better than the existing one in the literature. Moreover, when the eavesdropper’s channel noise variance is fairly large, our new feedback scheme is almost optimal (the new lower bound almost equals the upper bound). Possible future work could be to extend the proposed feedback scheme to the multiple-access situation.
Author Contributions
G.X. did the theoretical work, performed the experiments, analyzed the data, and drafting the work; B.D. designed the work, did the theoretical work, analyzed the data, interpreted the data for the work, and revised the work. Both of the authors approve the version to be published and agree to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved. Both authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Data Availability Statement
Not applicable.
Acknowledgments
This work was supported in part by the National Key Research and Development Program of China under Grant 2020YFB1806405; in part by the National Natural Science Foundation of China under Grant 62071392; and in part by the 111 Project No.111-2-14.
Yan, W.; Yuan, X.; He, Z.; Kuai, X. Passive beamforming and information transfer design for reconfigurable intelligent surfaces aided multiuser MIMO systems. IEEE J. Sel. Areas Commun.2020, 38, 1793–1808. [Google Scholar] [CrossRef]
Weissman, T. Capacity of channels with action-dependent states. IEEE Trans. Inf. Theory2010, 56, 5396–5411. [Google Scholar] [CrossRef]
Dikstein, L.; Permuter, H.H.; Shamai, S. MAC with action-dependent state information at one encoder. IEEE Trans. Inf. Theory2015, 61, 173–188. [Google Scholar] [CrossRef] [Green Version]
Chen, Y.; Vinck, A.J.H. Wiretap channel with side information. IEEE Trans. Inf. Theory2008, 54, 395–402. [Google Scholar] [CrossRef] [Green Version]
Treust, M.L.; Zaidi, A.; Lasaulce, S. An achievable rate region for the broadcast channel with asymmetric side information. In Proceedings of the 49th Annual Allerton Conference on Communication, Control, and Computing, Urbana-Champaign, Monticello, IL, USA, 28–30 September 2011; pp. 68–75. [Google Scholar]
El-Halabi, M.; Liu, T.; Georghiades, C.N.; Shamai (Shitz), S. Secret writing on dirty paper: A deterministic view. IEEE Trans. Inf. Theory2012, 58, 3419–3429. [Google Scholar] [CrossRef] [Green Version]
Mitrpant, C.; Vinck, A.; Luo, Y. An achievable region for the Gaussian wiretap channel with side information. IEEE Trans. Inf. Theory2006, 52, 2181–2190. [Google Scholar] [CrossRef]
Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory1978, 24, 451–456. [Google Scholar] [CrossRef]
Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J.1975, 54, 1355–1387. [Google Scholar] [CrossRef]
Csiszar, I.; Körner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
Dai, B.; Li, C.; Liang, Y.; Ma, Z.; Shamai, S. Impact of action-dependent state and channel feedback on Gaussian wiretap channels. IEEE Trans. Inf. Theory2020, 66, 3435–3455. [Google Scholar] [CrossRef]
Zhang, H.; Yu, L.; Dai, B. Feedback schemes for the action dependent wiretap channel with noncausal state at the transmitter. Entropy2019, 21, 278. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Zhang, H.; Yu, L.; Wei, C.; Dai, B. A new feedback scheme for the state-dependent wiretap channel with noncausal state at the transmitter. IEEE Access2019, 7, 45594–45604. [Google Scholar] [CrossRef]
Zaidi, A.; Awan, Z.H.; Shamai, S.; Vandendorpe, L. Secure degrees of Freedom of MIMO-X channels with output feedback and delayed CSIT. IEEE Trans. Inf. Forensics Secur.2013, 8, 1760–1774. [Google Scholar] [CrossRef] [Green Version]
Schalkwijk, J.P.M.; Kailath, T. A coding scheme for additive noise channels with feedback. Part I: No bandwidth constraint. IEEE Trans. Inf. Theory1966, 12, 172–182. [Google Scholar] [CrossRef]
Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the International Symposium on Information Theory and Its Applications, ISITA, Auckland, New Zealand, 7–10 December 2008; pp. 1–6. [Google Scholar]
Xie, G.; Dai, B.
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy2021, 23, 929.
https://doi.org/10.3390/e23080929
AMA Style
Xie G, Dai B.
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy. 2021; 23(8):929.
https://doi.org/10.3390/e23080929
Chicago/Turabian Style
Xie, Guangfen, and Bin Dai.
2021. "New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel" Entropy 23, no. 8: 929.
https://doi.org/10.3390/e23080929
APA Style
Xie, G., & Dai, B.
(2021). New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy, 23(8), 929.
https://doi.org/10.3390/e23080929
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.
Article Metrics
No
No
Article Access Statistics
For more information on the journal statistics, click here.
Multiple requests from the same IP address are counted as one view.
Xie, G.; Dai, B.
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy2021, 23, 929.
https://doi.org/10.3390/e23080929
AMA Style
Xie G, Dai B.
New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy. 2021; 23(8):929.
https://doi.org/10.3390/e23080929
Chicago/Turabian Style
Xie, Guangfen, and Bin Dai.
2021. "New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel" Entropy 23, no. 8: 929.
https://doi.org/10.3390/e23080929
APA Style
Xie, G., & Dai, B.
(2021). New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy, 23(8), 929.
https://doi.org/10.3390/e23080929
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.