Next Article in Journal
Structured H∞ Control for Spacecraft with Flexible Appendages
Previous Article in Journal
The Role of Instrumental Variables in Causal Inference Based on Independence of Cause and Mechanism
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel

1
School of Information Science and Technology, Southwest Jiaotong University, Chengdu 611756, China
2
Peng Cheng Laboratory, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2021, 23(8), 929; https://doi.org/10.3390/e23080929
Submission received: 30 May 2021 / Revised: 6 July 2021 / Accepted: 20 July 2021 / Published: 21 July 2021

Abstract

:
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which is also called the dirty paper wiretap channel (DP-WTC), has been extensively studied in the literature. Recently, it has been shown that taking actions on the corrupted state interference of the DP-WTC (also called the action-dependent DP-WTC) helps to increase the secrecy capacity of the DP-WTC. Subsequently, it has been shown that channel feedback further increases the secrecy capacity of the action-dependent DP-WTC (AD-DP-WTC), and a sub-optimal feedback scheme is proposed for this feedback model. In this paper, a two-step hybrid scheme and a corresponding new lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback are proposed. The proposed new lower bound is shown to be optimal (achieving the secrecy capacity) and tighter than the existing one in the literature for some cases, and the results of this paper are further explained via numerical examples.

1. Introduction

Dirty paper coding is one of the most important pre-coding schemes in wireless communications and has a wide range of applications in information hiding [1]. Dirty paper coding was first investigated by Costa in his well-known paper on the dirty paper channel (DPC) [2], where a corrupted Gaussian state interference of a white Gaussian channel is noncausally known at the transmitter and not available at the receiver. Costa showed that the capacity of the DPC equals the capacity of the same model without state interference, which indicates that though the receiver does not know the state interference, it can still be perfectly removed by using dirty paper coding.
Note that in [2], the channel state is assumed to be generated by nature. However, in some practical scenarios, the state is affected or controlled by the communication systems, e.g., in intelligent reflecting surface-aided communication systems, the state is formed in part by the reflecting phase shift which is actually controlled by the transceiver [3]. Such a case was first investigated by Weissman in his paper on the action-dependent dirty paper channel (AD-DPC) [4], where the corrupted state interference of the DPC is affected and noncausally known by the transmitter. In [4], a lower bound on the capacity of AD-DPC was proposed, and the capacity was fully determined in [5].
In recent years, the study of the above dirty paper channels under additional secrecy constraints has received a lot attention. Specifically, [6] studied the discrete memoryless wiretap channel with state interference noncausally known by the transmitter, and obtained upper and lower bounds on the secrecy capacity. The authors of [7] extended the model studied in [6] to the broadcast situation, and also provided bounds on the secrecy capacity region of this extended model. The authors of [8,9] studied the Gaussian case of [6], namely, the dirty paper wiretap channel, and proposed bounds on the secrecy capacity. Furthermore, [8,9] pointed out that the proposed secret dirty paper coding increases the secrecy capacity of the Gaussian wiretap channel [10]. The above works mainly adopted the tools in [11,12] for establishing the secrecy rate/capacity. Very recently, the authors of [13] studied the AD-DPC with an additional eavesdropper, which is also called the action-dependent dirty paper wiretap channel (AD-DP-WTC), and proposed lower and upper bounds on the secrecy capacity. Note that the capacity results given in [9,13] indicate that:
  • There is a penalty term between secrecy capacity and capacity of the same model without secrecy constraints.
  • If the eavesdropper’s channel is less noisy than the legitimate receiver’s, the secrecy capacity may equal zero, i.e., no positive rate can be guaranteed for secure communications.
Very recently, it has been shown that channel feedback is an effective way to enhance the secrecy capacities of the DP-WTC [14,15] and the multi-input multi-output (MIMO) X-channels [16]. In [16], it has been shown that feedback increases the secure degrees of freedom (SDoF) region of the MIMO X-channel with secrecy constraints, which indicates that feedback also enlarges the secrecy capacity of the same model, even if the eavesdropper’s channel is less noisy than the legitimate receiver’s. The authors of [14,15,16] mainly adopted the idea of a generating secret key from the channel feedback and using this key to encrypt the transmitted message. Subsequently, [13] showed that a variation of the classical Schalkwijk–Kailath (SK) feedback scheme [17] for the point-to-point white Gaussian channel achieves the secrecy capacity of the DP-WTC with noiseless feedback, and the secrecy capacity equals the capacity of the same model without secrecy constraints, i.e., to achieve perfect secrecy, no rate needs to be sacrificed even if the eavesdropper gains advantage over the legitimate receiver. In addition, the authors of [13] also proposed a sub-optimal SK type feedback scheme for the AD-DP-WTC with noiseless feedback (see Figure 1), i.e., this scheme achieves a lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback, and the secrecy capacity remains open.
In this paper, we derive a new lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback, which is based on a hybrid two-step feedback scheme. The proposed new lower bound is shown to be optimal and tighter than the existing one in the literature for some cases, and the results of this paper are further explained via numerical examples. The remainder of this paper is organized as follows. A formal definition of the model studied in this paper and previous results are introduced in Section 2. The main result and the corresponding proof are given in Section 3 and Section 4, respectively. Section 5 includes the summary of all results in this paper and discusses future work.

2. Model Formulation and Previous Results

2.1. Model Formulation

For the AD-DP-WTC with noiseless feedback (see Figure 1), the i-th ( i { 1 , 2 , , N } ) channel inputs and outputs are given by
S i = A i + W i , Y i = X i + S i + η 1 , i , Z i = Y i + η 2 , i
where X i is the output of the channel encoder subject to an average power constraint P ( 1 N i = 1 N E [ X i 2 ] P ), A i is the output of the action encoder subject to an average power constraint P A ( 1 N i = 1 N E [ A i 2 ] P A ), Y i and Z i are channel outputs, respectively, at the legitimate receiver and the eavesdropper, and W i , η 1 , i , η 2 , i are independent Gaussian noises and are independently identically distributed (i.i.d.) across the time index i. Note that W i N ( 0 , σ w 2 ) , η 1 , i N ( 0 , σ 1 2 ) , and η 2 , i N ( 0 , σ 2 2 ) . The transmitted message M is uniformly drawn in its alphabet M = { 1 , 2 , , | M | } .
At time instant i ( i { 1 , 2 , , N } ), a corrupted state interference S i is generated through a white Gaussian channel with i.i.d. noise W i N ( 0 , σ w 2 ) and channel input A i , where A i is a (stochastic) function of the message M. Since the corrupted state interference S N = ( S 1 , , S N ) is noncausally known by the channel encoder, the i-th channel input X i is a (stochastic) function of the message M, S N , and the feedback Y i 1 = ( Y 1 , Y 2 , , Y i 1 ) .
The legitimate receiver generates an estimation M ^ = ψ ( Y N ) , where ψ is the legitimate receiver’s decoding function, and the average decoding error probability equals
P e = 1 | M | m M 1 P r { ψ ( Y N ) m | m sent } .
The eavesdropper’s equivocation rate of the message M is denoted by
Δ = 1 N H ( M | Z N ) .
A rate R is said to be achievable with perfect weak secrecy if for any ϵ and sufficiently large N, there exists a channel encoder–decoder such that
log | M | N = R , Δ R ϵ , P e ϵ .
The secrecy capacity of the AD-DP-WTC with feedback, which is the maximum achievable secrecy rate defined in (4), is denoted by C s a g f . A new lower bound, R s a g f on C s a g f , will be given in the next section.

2.2. SK Feedback Scheme for the Point-to-Point White Gaussian Channel

For the point-to-point white Gaussian channel with feedback, at time i ( i { 1 , 2 , , N } ), channel input and output are given by
Y i = X i + η i ,
where X i is the channel input subject to an average power constraint P ( 1 N i = 1 N E [ X i 2 ] P ), and η i N ( 0 , σ 2 ) is the i.i.d. channel noise. The channel input X i is a function of the message M and the feedback Y i 1 . It is well known that the capacity C g f of the white Gaussian channel with feedback equals the capacity C g of the same model without feedback, i.e.,
C g f = C g = 1 2 log ( 1 + P σ 2 ) .
The authors of [17] showed that the classical SK scheme achieves C g f , and this scheme is described below.
Since M takes the values in M = { 1 , 2 , , 2 N R } , we divide the interval [ 0.5 , 0.5 ] into 2 N R equally spaced sub-intervals, and the center of each sub-interval is mapped to a message value in M . Let θ be the center of the sub-interval with respect to (w.r.t.) the message M.
At time 1, the transmitter transmits
X 1 = 12 P θ .
The receiver receives Y 1 = X 1 + η 1 , and obtains an estimation of θ by computing
θ ^ 1 = Y 1 12 P = θ + η 1 12 P = θ + ϵ 1 ,
where ϵ 1 = θ ^ 1 θ = η 1 12 P , and α 1 σ 2 12 P .
At time k ( 2 k N ) , the receiver obtains Y k = X k + η k , and obtains an estimation of θ k by computing
θ ^ k = θ ^ k 1 E [ Y k ϵ k 1 ] E [ Y k 2 ] Y k ,
where
ϵ k = θ ^ k θ ,
(10) yields that
ϵ k = ϵ k 1 E [ Y k ϵ k 1 ] E [ Y k 2 ] Y k .
At time k ( k { 2 , 3 , , N } ), the transmitter sends
X k = P α k 1 ϵ k 1 ,
where α k 1 V a r ( ϵ k 1 ) .
In [17], it has been shown that the decoding error P e of the above coding scheme is upper bounded by
P e P r { | ϵ N | > 1 2 | M | 1 } 2 Q ( 1 2 · 2 N R 1 α N ) ,
where Q ( x ) is the tail of the unit Gaussian distribution evaluated at x, and
α N = σ 2 12 P ( σ 2 P + σ 2 ) N 1 .
From (13) and (14), we conclude that if
R < 1 2 log ( 1 + P σ 2 ) = C g f ,
P e 0 as N . Recently, [18] showed that the above classical SK scheme, which is not designed with the consideration of secrecy, already achieves the secrecy capacity of the Gaussian wiretap channel with noiseless feedback, i.e., the corresponding secrecy capacity equals the capacity C g f of the same model without secrecy constraints.

2.3. Previous Results on the AD-DP-WTC with Feedback

For the capacity C s a g f of the AD-DP-WTC with feedback, [13] showed that it is bounded by
L C s a g f C a g ,
where
C a g = max ( ρ 1 , ρ 2 ) : ρ 1 2 + ρ 2 2 1 1 2 log ( 1 + P ( 1 ρ 1 2 ρ 2 2 ) σ 1 2 ) + 1 2 log ( 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 ) ,
L = max ( ρ 1 , ρ 2 ) : ρ 1 2 + ρ 2 2 1 1 2 log ( 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 ) .
Note that C a g is the capacity of the AD-DPC without feedback, and is given in [5].
Proof Sketch of (16).
Since the capacity C s a g f of the AD-DP-WTC with feedback is no larger than that of the same model without secrecy constraints, and feedback does not increase the capacity of the AD-DPC [4], and C a g serves as a trivial upper bound on C s a g f . The lower bound C s a g f L is derived by constructing
X = ρ 2 P P A A + ρ 1 P σ w W ,
for ρ 1 2 + ρ 2 2 = 1 , and
X = ρ 2 P P A A + ρ 1 P σ w W + G ,
for ρ 1 2 + ρ 2 2 < 1 , where G is randomly generated according to G N ( 0 , P ( 1 ρ 1 2 ρ 2 2 ) ) and it is independent of A and W. Substituting (19) and (20) into (1), the AD-DP-WTC with feedback is equivalent to the Gaussian wiretap channel with feedback with input A, channel noise W + G + η 1 + η 2 , channel output Y of the legitimate receiver, and the channel output Z of the eavesdropper. Directly applying the SK scheme introduced in the preceding subsection, we conclude that L is achievable. Moreover, from [18], we know that the SK scheme also achieves the secrecy capacity of the Gaussian wiretap channel with noiseless feedback, which indicates that L is achievable with perfect weak secrecy, and the proof is completed. □
Note that the above lower and upper bounds on C s a g f do not meet in general, and exploring a tighter lower bound on C s a g f is the motivation of this paper.

3. Main Results of this Paper

3.1. A New Lower Bound on the Secrecy Capacity of the AD-DP-WTC with Feedback

Theorem 1.
A new lower bound on the secrecy capacity C s a g f of the AD-DP-WTC with feedback is given by
R s a g f = max ( ρ 1 , ρ 2 ) : ρ 1 2 + ρ 2 2 1 1 2 log ( 1 + ( 1 ρ 1 2 ρ 2 2 ) P σ 1 2 ) + 1 2 log ( 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 ) 1 2 log ( 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 + σ 2 2 ) .
Remark 1.
Comparing the new lower bound in (21) with the upper bound C a g in (16), it is easy to see that there still exists a gap between the two bounds due to the penalty term 1 2 log ( 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 + σ 2 2 ) .
The following Corollary 1 shows that the proposed new lower bound in (21) is optimal for a special case. Moreover, the following Corollary 2 shows that the new lower bound in (21) is tighter than the existing lower bound in (16) when σ w 2 tends to infinity.
Corollary 1.
For σ 2 2 ,
lim σ 2 2 R s a g f = C a g ,
which indicates that the secrecy capacity is determined for this case.
Proof. 
Formula (22) is directly obtained by using (21) and letting σ 2 2 . Hence the proof is completed. □
Corollary 2.
lim σ w 2 R s a g f lim σ w 2 L ,
where L is the existing lower bound defined in (18).
Proof. 
Define the gap R G between the new lower bound in (21) and the existing lower bound in (18) by
R G = R s a g f L = max ( ρ 1 , ρ 2 ) : ρ 1 2 + ρ 2 2 1 1 2 log ( 1 + ( 1 ρ 1 2 ρ 2 2 ) P σ 1 2 ) 1 2 log ( 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 + σ 2 2 ) .
  • For the case that the maximum is achieved when ρ 1 2 + ρ 2 2 = 1 ,
    lim σ w 2 R G = 0 .
  • For the case that the maximum is achieved when ρ 1 2 + ρ 2 2 < 1 ,
    lim σ w 2 R G > 0 .
Combining (25) and (26), we conclude that lim σ w 2 R G 0 , which indicates that lim σ w 2 R s a g f lim σ w 2 L . The proof of Corollary 2 is completed. □
Proof Sketch of Theorem 1. 
The main idea of the achievable scheme is briefly illustrated by Figure 2 and Figure 3. In Figure 2, we split the message M into two parts M = ( M 1 , M 2 ) , where the sub-message M j ( j = 1 , 2 ) is uniformly distributed in M j = { 1 , , 2 N R j } . The sub-message M 1 is available at both the action encoder and channel encoder, and the sub-message M 2 is only available at the channel encoder. Let X i = U i + V i + G i , where M 1 is encoded as U i with power ρ 2 2 P , M 2 is encoded as V i with power P = ( 1 ρ 1 2 ρ 2 2 ) P , G i = ρ 1 2 P σ w 2 W i , and 1 ρ j 1 for j = 1 , 2 . Moreover, M 1 is also encoded as A i with power P A , and
U i = ρ 2 2 P P A A i ,
which indicates that U i is a deterministic function of A i . □
The i-th ( i { 1 , 2 , , N } ) channel inputs and outputs are rewritten as
Y i = X i + S i + η 1 , i = U i + V i + G i + A i + W i + η 1 , i = A i + V i + W i + η 1 , i Z i = Y i + η 2 , i ,
where W i = G i + W i is an i.i.d Gaussian noise process with zero mean and variance σ w 2 = ( σ w + ρ 1 2 P ) 2 , and A i = A i + U i is subject to an average power constraint P = P A + ρ 2 2 P + 2 ρ 2 2 P P A .
In Figure 3, since M 1 is known by the channel encoder, the codeword A i = A i + U i can be subtracted when applying an SK type feedback scheme to M 2 , i.e., the transmission of M 2 is through an equivalent channel with input V i , output
Y i = Y i A i = V i + W i + η 1 , i .
Moreover, since M 1 and S N are known by the channel encoder, W N = S N A N and G N = ρ 1 2 P σ w 2 W N , W N = W N + G N can be viewed as state interference which is noncausally known at the encoder of the equivalent channel of M 2 (namely, the equivalent encoder of M 2 ).
In addition, the transmission of M 1 is through an equivalent channel with inputs A i = A i + U i , output Y i = A i + V i + W i + η 1 , i , and channel noise η 1 , i = V i + W i + η 1 , i , which is nonwhite Gaussian noise since V i is not i.i.d generated.
Then, applying an SK type scheme to M 2 , and Wyner’s random binning scheme [11] together with Feinstein’s greedy coding scheme [19] to M 1 , the lower bound in Theorem 1 is obtained. The detail of the proof is given in the next section.

3.2. Numerical Results

Figure 4 plots the upper bound, the existing lower bound and the new lower bound on the secrecy capacity of the AD-DP-WTC with feedback for P A = 10 , σ w 2 = 2000 , σ 1 2 = 30 , σ 2 2 = 100 , and P taking values in [ 0 , 30 ] . From Figure 4, we see that our new scheme performs better than the existing one when the noise variance σ w 2 is large enough.
Figure 5 plots the bounds for P A = 5 , σ w 2 = 240 , σ 1 2 = 30 , σ 2 2 = 2500 , and P taking values in [ 0 , 30 ] . From Figure 5, we see that our new lower bound almost meets the upper bound when the eavesdropper’s channel noise variance σ 2 2 is large enough.

4. Proof of Theorem 1

The encoding and decoding procedure of Figure 3 is described below. Since M 2 takes values in M 2 { 1 , 2 , , 2 N R 2 } , the interval [−0.5,0.5] is divided into 2 N R 2 equally spaced sub-intervals, and the center of each sub-interval is mapped to a message value. Let θ be the center of the sub-interval w.r.t. the message M 2 (the variance of θ approximately equals 1 12 ). Let A N = ( A 1 = 0 , A 2 , , A N ) = ( 0 , A 2 N ) , where A 2 N = ( A 2 , , A N ) . Here, A 2 N is the codeword of the sub-message M 1 and a dummy message M 1 , and it is generated by Feinstein’s greedy construction for the non-i.i.d. Gaussian channel [19]. Moreover, M 1 and M 1 are uniformly distributed in { 1 , , 2 ( N 1 ) R 1 } and { 1 , , 2 ( N 1 ) R } , respectively.
Encoding procedure: Before the transmission, for a given sub-message M 1 , first, a dummy message M 1 is randomly chosen from its alphabet { 1 , , 2 ( N 1 ) R } . Then, Feinstein’s greedy construction [19] is applied to encode the message pair ( M 1 , M 1 ) as the codeword A 2 N = ( A 2 , , A N ) .
At time 1, the equivalent encoders of M 1 and M 2 , respectively, send
A 1 = 0 , V 1 = 12 P ( θ W 1 12 P + B ) ,
where
B = i = 2 N E ( Y i ε i 1 ) E ( Y i ) 2 W i , P = ( 1 ρ 1 2 ρ 2 2 ) P , Y i = V i + η 1 , i
and ε i 1 will be defined later.
At time 2, once receiving the feedback Y 1 = V 1 + W 1 + η 1 , 1 , the equivalent encoder of M 2 computes
Y 1 12 P = θ + B + η 1 , 1 12 P = θ + B + ε 1 ,
where ε 1 = η 1 , 1 12 P and α 1 = V a r ( ε 1 ) . The equivalent encoders of M 1 and M 2 , respectively, send A 2 (the first component of A 2 N ) and
V 2 = P α 1 ε 1 .
At time k ( 3 k N ), once receiving the feedback Y k 1 = A k 1 + V k 1 + η 1 , k 1 + W k 1 , the equivalent encoder of M 2 computes
ε k 1 = ε k 2 E ( Y k 1 ε k 2 ) E ( Y k 1 ) 2 Y k 1 ,
where Y k 1 = Y k 1 A k 1 W k 1 = V k 1 + η 1 , k 1 and α k 1 = V a r ( ε k 1 ) . The equivalent encoders of M 1 and M 2 , respectively, send A k (the k 1 -th component of A 2 N ) and
V k = P α k 1 ε k 1 .
Lemma 1.
For 3 k N , the general terms of α k 1 and V k can be expressed as
α k 1 = V a r ( ε k 1 ) = α 1 ( σ 1 2 P + σ 1 2 ) k 2 ,
V k = 1 12 α k 1 ( σ 1 2 P + σ 1 2 ) k 2 η 1 , 1 i = 1 k 2 α i α k 1 P ( σ 1 2 ) k 2 i ( P + σ 1 2 ) k ( i + 1 ) η 1 , i + 1 .
Proof. 
The proof of Lemma 1 is in Appendix A. □
Decoding procedure: The legitimate receiver does a two-step decoding scheme. First, by applying Feinstein’s decoding rule [19] to the decoding of A 2 N . According to Feinstein’s lemma [19], the decoding error probability of M 1 and M 1 , denoted by P e 1 , can be arbitrarily small if
R 1 + R I ( A 2 N ; Y 2 N ) N 1 ,
where Y 2 N = ( Y 2 , Y 3 , , Y N ) .
Second, after decoding M 1 , the legitimate receiver obtains A k for all 2 k N , and subtracts A k from Y k , then the legitimate receiver obtains Y k = Y k A k = V k + η 1 , k + W k .
At time 1, the legitimate receiver obtains Y 1 = V 1 + W 1 + η 1 , 1 and computes
θ ^ 1 = Y 1 12 P = θ + B + ε 1 .
At time k ( 2 k N ), the legitimate receiver’s estimation θ ^ k of θ is given by
θ ^ k = θ ^ k 1 E ( Y k ε k 1 ) E ( Y k ) 2 Y k = ( a ) θ ^ k 1 + ε k ε k 1 E ( Y k ε k 1 ) E ( Y k ) 2 W k = θ ^ 1 + ε k ε 1 j = 2 k E ( Y j ε j 1 ) E ( Y j ) 2 W j = ( b ) θ + ε k + B j = 2 k E ( Y j ε j 1 ) E ( Y j ) 2 W j ,
where Y k = V k + η 1 , k + W k , Y k = V k + η 1 , k , (a) follows from (34), and (b) follows from (39). From (40), we can conclude that for k = N ,
θ ^ N = θ + ε N + B j = 2 N E ( Y j ε j 1 ) E ( Y j ) 2 W j = ( c ) θ + ε N ,
where (c) follows from (31).
Now we bound the decoding error probability P e 2 of M 2 as follows. From θ ^ N = θ + ε N and the definition of θ , we have
P e 2 P r [ | ε N | 1 2 ( | M 2 | 1 ) ] ( d ) 2 Q ( 1 2 × 2 N R 2 α N ) = ( e ) 2 Q 1 2 σ 1 2 + P 12 P 2 N R 2 2 N 2 log ( 1 + P σ 1 2 ) = 2 Q 1 2 σ 1 2 + P 12 P 2 N ( 1 2 log ( 1 + P σ 1 2 ) R 2 ) ,
where ( d ) following from Q ( x ) is the tail of the unit Gaussian distribution evaluated at x, and ( e ) is from Lemma 1. Since Q ( x ) is decreasing while x is increasing, from (42), we can conclude that if
R 2 1 2 log ( 1 + P σ 1 2 ) = 1 2 log ( 1 + ( 1 ρ 1 2 ρ 2 2 ) P σ 1 2 ) ,
P e 2 0 as N is large enough.
Note that the total decoding error probability P e of M = ( M 1 , M 2 ) is upper bounded by P e P e 1 + P e 2 . From the above analysis, we conclude that P e 0 as N tends to infinity if (38) and (43) are guaranteed.
Equivocation analysis: We bound the equivocation rate H ( M | Z N ) N as follows:
H ( M | Z N ) N = H ( M 1 , M 2 | Z N ) N = H ( M 1 | Z N ) + H ( M 2 | Z N , M 1 ) N .
The first part H ( M 1 | Z N ) N of (44) is bounded by
H ( M 1 | Z N ) N = H ( M 1 | Z 1 , Z 2 N ) N = ( f ) H ( M 1 | Z 2 N ) N = 1 N ( h ( M 1 , Z 2 N ) h ( Z 2 N ) ) = 1 N ( h ( M 1 , Z 2 N , A 2 N ) h ( A 2 N | M 1 , Z 2 N ) h ( Z 2 N ) ) = 1 N ( h ( M 1 , A 2 N ) + h ( Z 2 N | M 1 , A 2 N ) h ( A 2 N | M 1 , Z 2 N ) h ( Z 2 N ) ) = 1 N ( h ( M 1 , A 2 N ) I ( Z 2 N ; M 1 , A 2 N ) h ( A 2 N | M 1 , Z 2 N ) ) = 1 N ( h ( M 1 , A 2 N | Z 2 N ) h ( A 2 N | M 1 , Z 2 N ) ) = 1 N ( h ( A 2 N | Z 2 N ) + H ( M 1 | A 2 N , Z 2 N ) h ( A 2 N | M 1 , Z 2 N ) ) = 1 N ( h ( A 2 N | Z 2 N ) h ( A 2 N | M 1 , Z 2 N ) + h ( A 2 N ) h ( A 2 N ) ) = 1 N ( h ( A 2 N ) I ( Z 2 N ; A 2 N ) h ( A 2 N | M 1 , Z 2 N ) ) = ( g ) 1 N ( H ( M 1 , M 1 ) I ( Z 2 N ; A 2 N ) h ( A 2 N | M 1 , Z 2 N ) ) = 1 N ( ( N 1 ) ( R 1 + R ) I ( Z 2 N ; A 2 N ) h ( A 2 N | M 1 , Z 2 N ) ) ( h ) N 1 N ( R 1 + R ) I ( Z 2 N ; A 2 N ) N δ ( ε ) N = N 1 N ( R 1 + R ) I ( Z 2 N ; A 2 N ) N 1 N 1 N δ ( ε ) N ,
where ( f ) follows from the Markov chain M 1 Z 2 N Z 1 and Z 2 N = ( Z 2 , Z 3 , , Z N ) , ( g ) is due to the fact that A 2 N is a deterministic function of M 1 , M 1 , and ( h ) follows from Fano’s inequality when the codeword A 2 N is generated by Feinstein’s greedy construction [19], i.e., if
R I ( Z 2 N ; A 2 N ) N 1 ,
given M 1 , the eavesdropper’s decoding error probability P e w of M 1 is arbitrarily small ( P e w ϵ ) as N tends to infinity, then using Fano’s inequality, we have
h ( A 2 N | M 1 , Z 2 N ) δ ( P e w ) δ ( ε ) .
Formula (45) indicates that N is sufficiently large, if
R I ( Z 2 N ; A 2 N ) N 1 ,
we have
H ( M 1 | Z N ) N R 1 ϵ ,
where ϵ 0 as N .
From (46) and (48), we conclude that
R = I ( Z 2 N ; A 2 N ) N 1 .
Substituting (50) into (38) and noting that the maximum of R 1 is achieved when N , then we have
R 1 lim N I ( A 2 N ; Y 2 N ) I ( A 2 N ; Z 2 N ) N 1
Lemma 2.
The fundamental limit of R 1 in (51) is upper bounded by
R 1 lim N I ( A 2 N ; Y 2 N ) I ( A 2 N ; Z 2 N ) N 1 1 2 log 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 1 2 log 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 + σ 2 2
Proof. 
The Proof of Lemma 2 is in Appendix B. □
The second part H ( M 2 | Z N , M 1 ) N of (44) is bounded by
H ( M 2 | Z N , M 1 ) N = ( a ) H ( θ | Z N , M 1 ) N 1 N H ( θ Z N , η 1 , 1 , , η 1 , N , η 2 , 2 , , η 2 , N , W 1 , , W N , M 1 , M 1 ) = ( b ) 1 N H ( θ 12 P ( θ W 1 12 P + B ) + W 1 + η 1 , 1 + η 2 , 1 , A 2 + P α 1 ε 1 + W 2 + η 1 , 2 + η 2 , 2 , A 3 + f 2 , 3 ( η 1 , 1 , η 1 , 2 ) + W 3 + η 1 , 3 + η 2 , 3 , , A N + f 2 , N ( η 1 , 1 , , η 1 , N 1 ) + W N + η 1 , N + η 2 , N , η 1 , 1 , , η 1 , N , η 2 , 2 , , η 2 , N , W 1 , , W N , M 1 , M 1 ) = 1 N H ( θ | 12 P θ + η 2 , 1 , η 1 , 1 , , η 1 , N , η 2 , 2 , , η 2 , N , W 1 , , W N , M 1 , M 1 ) = ( c ) 1 N H ( θ | 12 P θ + η 2 , 1 ) = ( d ) 1 N { H ( θ ) h ( 12 P θ + η 2 , 1 ) + h ( η 2 , 1 ) } ( e ) R 2 1 2 N log ( 1 + P σ 2 2 )
where (a) follows from the fact that there is a one-to-one mapping between M 2 and θ , (b) follows from (28), (30), (33) and (A5), (c) follows from the fact that θ and η 2 , 1 are independent of η 1 , 1 , , η 1 , N , η 2 , 2 , , η 2 , N , W 1 , , W N , M 1 , M 1 , (d) follows from the fact that θ and η 2 , 1 are independent of each other, and (e) follows from H ( θ ) = N R 2 , and the variance of θ equals 1 12 as N tends to infinity.
Substituting (49) and (53) into (44), we have
H ( M | Z N ) N = H ( M 1 | Z N ) + H ( M 2 | Z N , M 1 ) N R 1 ϵ + R 2 1 2 N log ( 1 + P σ 2 2 ) = R ( ϵ + 1 2 N log ( 1 + P σ 2 2 ) )
where R = R 1 + R 2 . Choosing sufficiently large N, H ( M | Z N ) N R ϵ is satisfied. Finally, combining (43) and (52), the lower bound in Theorem 1 is derived, and the proof is completed.

5. Conclusions and Future Work

This paper shows a new lower bound on the secrecy capacity of the AD-DP-WTC with noiseless feedback by proposing a novel two-step hybrid feedback scheme. The numerical result shows that when the noise variance σ w 2 is large enough, our new feedback scheme performs better than the existing one in the literature. Moreover, when the eavesdropper’s channel noise variance is fairly large, our new feedback scheme is almost optimal (the new lower bound almost equals the upper bound). Possible future work could be to extend the proposed feedback scheme to the multiple-access situation.

Author Contributions

G.X. did the theoretical work, performed the experiments, analyzed the data, and drafting the work; B.D. designed the work, did the theoretical work, analyzed the data, interpreted the data for the work, and revised the work. Both of the authors approve the version to be published and agree to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved. Both authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

This work was supported in part by the National Key Research and Development Program of China under Grant 2020YFB1806405; in part by the National Natural Science Foundation of China under Grant 62071392; and in part by the 111 Project No.111-2-14.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Lemma 1

From (32), we know that ε 1 = η 1 , 1 12 P and α 1 = V a r ( ε 1 ) , and hence α 1 = E ( η 1 , 1 12 P ) 2 = σ 1 2 12 P .
In the same way, since ε 2 = ε 1 E ( Y 2 ε 1 ) E ( Y 2 ) 2 Y 2 and α 2 = V a r ( ε 2 ) , we have
α 2 = V a r ( ε 2 ) = E ε 1 E ( Y 2 ε 1 ) E ( Y 2 ) 2 Y 2 2 = E ( ε 1 ) 2 E ( Y 2 ε 1 ) 2 E ( Y 2 ) 2 = α 1 α 1 P P + σ 1 2 = α 1 σ 1 2 P + σ 1 2 ,
where Y 2 = V 2 + η 1 , 2 = P α 1 ε 1 + η 1 , 2 .
For 3 k N ,
α k 1 = V a r ( ε k 1 ) = ( a ) E ε k 2 E ( Y k 1 ε k 2 ) E ( Y k 1 ) 2 Y k 1 2 = E ( ε k 2 ) 2 E ( Y k 1 ε k 2 ) 2 E ( Y k 1 ) 2 = α k 2 α k 2 P P + σ 1 2 = α k 2 σ 1 2 P + σ 1 2 = α 1 σ 1 2 P + σ 1 2 k 2 ,
where ( a ) follows from (34), and Y k 1 = V k 1 + η 1 , k 1 = P α k 2 ε k 2 + η 1 , k 1 .
Now, it remains to further compute the second part of Lemma 1. According to (35), we have V k = P α k 1 ε k 1 , and it can be further expressed as
V k = P α k 1 ε k 1 = ( b ) P α k 1 ε k 2 E ( V k 1 + η 1 , k 1 ) ε k 2 E ( V k 1 + η 1 , k 1 ) 2 ( V k 1 + η 1 , k 1 ) = P α k 2 α k 2 α k 1 ε k 2 E ( V k 1 + η 1 , k 1 ) ε k 2 E ( V k 1 + η 1 , k 1 ) 2 ( V k 1 + η 1 , k 1 ) = α k 2 α k 1 V k 1 P α k 1 α k 2 P P + σ 1 2 ( V k 1 + η 1 , k 1 ) = α k 2 α k 1 σ 1 2 P + σ 1 2 V k 1 α k 2 α k 1 P P + σ 1 2 η 1 , k 1 ,
where ( b ) follows from (34), and Y k 1 = V k 1 + η 1 , k 1 = P α k 2 ε k 2 + η 1 , k 1 .
Therefore, we conclude that
V 3 = α 1 α 2 σ 1 2 P + σ 1 2 V 2 α 1 α 2 P P + σ 1 2 η 1 , 2 , V 4 = α 2 α 3 σ 1 2 P + σ 1 2 V 3 α 2 α 3 P P + σ 1 2 η 1 , 3 = α 1 α 3 σ 1 2 P + σ 1 2 2 V 2 i = 1 2 α i α 3 P ( σ 1 2 ) 2 i ( P + σ 1 2 ) 4 ( i + 1 ) η 1 , i + 1 V k = α 1 α k 1 σ 1 2 P + σ 1 2 k 2 V 2 i = 1 k 2 α i α k 1 P ( σ 1 2 ) k 2 i ( P + σ 1 2 ) k ( i + 1 ) η 1 , i + 1 = ( c ) 1 12 α k 1 σ 1 2 P + σ 1 2 k 2 η 1 , 1 i = 1 k 2 α i α k 1 P ( σ 1 2 ) k 2 i ( P + σ 1 2 ) k ( i + 1 ) η 1 , i + 1
where ( c ) follows from V 2 = P α 1 ε 1 = P α 1 η 1 , 1 12 P . From (A4) and (33), we see that V k is a function of ( η 1 , 1 , η 1 , 2 , , η 1 , k 1 ) , i.e.,
V k = f 2 , k ( η 1 , 1 , η 1 , 2 , , η 1 , k 1 ) , 2 k N .
Finally, according to (A2) and (A4), we complete the proof of Lemma 1.

Appendix B. Proof of Lemma 2

Since
lim N I ( A 2 N ; Y 2 N ) I ( A 2 N ; Z 2 N ) N 1 = lim N h ( Y 2 N ) h ( Y 2 N | A 2 N ) h ( Z 2 N ) + h ( Z 2 N | A 2 N ) N 1 = ( a ) lim N h ( Y 2 N ) N 1 h ( Z 2 N ) N 1 h ( η 1 , 2 N ) N 1 + h ( η 1 , 2 N + η 2 , 2 N ) N 1 ,
where ( a ) is due to the fact that Y 2 N = A 2 N + η 1 , 2 N , Z 2 N = Y 2 N + η 2 , 2 N , η 1 , 2 N = V 2 N + W 2 N + η 1 , 2 N and A 2 N is independent of η 1 , 2 N , η 2 , 2 N , and η 1 , 2 N = ( η 1 , 2 , η 1 , 3 , , η 1 , N ) , η 2 , 2 N = ( η 2 , 2 , η 2 , 3 , , η 2 , N ) .
For the part h ( Y 2 N ) N 1 h ( Z 2 N ) N 1 of (A6), we have
lim N h ( Y 2 N ) N 1 h ( Z 2 N ) N 1 = lim N h ( Y 2 N ) N 1 h ( Y 2 N + η 2 , 2 N ) N 1 ( b ) lim N h ( Y 2 N ) N 1 1 2 log ( 2 2 h ( Y 2 N ) N 1 + 2 π e σ 2 2 ) ( c ) 1 2 log 2 π e ( P + P + σ w 2 + σ 1 2 ) 1 2 log 2 π e ( P + P + σ w 2 + σ 1 2 + σ 2 2 ) ,
where ( b ) follows from the entropy power inequality, ( c ) follows from h ( Y 2 N ) N 1 1 2 log ( 2 2 h ( Y 2 N ) N 1 + 2 π e σ 2 2 ) increasing while h ( Y 2 N ) N 1 is increasing and
h ( Y 2 N ) N 1 1 N 1 i = 2 N h ( Y i ) 1 N 1 i = 2 N 1 2 log 2 π e E ( Y i 2 ) = N N 1 1 N i = 2 N 1 2 log 2 π e E ( Y i 2 ) 1 2 N N 1 log 2 π e ( P + P + σ w 2 + σ 1 2 ) ,
where P = P A + ρ 2 2 P + 2 ρ 2 P P A , P = P ( 1 ρ 1 2 ρ 2 2 ) , σ w 2 = ( σ w + ρ 1 P ) 2 , and the last inequality of (A8) is from Jensen’s inequality.
Based on the joint differential entropy, for the part h ( η 1 , 2 N ) N 1 of (A6), we have
lim N h ( η 1 , 2 N ) = lim N 1 2 log ( 2 π e ) N 1 | K | ,
where K is a covariance matrix, and
| K | = E ( η 1 , 2 η 1 , 2 ) E ( η 1 , 2 η 1 , 3 ) E ( η 1 , 2 η 1 , N ) E ( η 1 , 3 η 1 , 2 ) E ( η 1 , 3 η 1 , 3 ) E ( η 1 , 3 η 1 , N ) E ( η 1 , N η 1 , 2 ) E ( η 1 , N η 1 , 3 ) E ( η 1 , N η 1 , N ) ( N 1 ) × ( N 1 )
with
E ( η 1 , k η 1 , k ) = P + σ w 2 + σ 1 2 , 2 k N
E ( η 1 , k η 1 , j ) = E ( V k + W k + η 1 , k ) ( V j + W j + η 1 , j ) = E ( V k V j ) + E ( η 1 , k V j ) , 2 k N , k < j N .
According to (A4), we have
V k = α 1 α k 1 σ 1 2 P + σ 1 2 k 2 V 2 i = 1 k 2 α i α k 1 P ( σ 1 2 ) k 2 i ( P + σ 1 2 ) k ( i + 1 ) η 1 , i + 1 , V j = α 1 α j 1 σ 1 2 P + σ 1 2 j 2 V 2 i = 1 j 2 α i α j 1 P ( σ 1 2 ) j 2 i ( P + σ 1 2 ) j ( i + 1 ) η 1 , i + 1 = α 1 α j 1 σ 1 2 P + σ 1 2 j 2 V 2 i = 1 k 2 α i α j 1 P ( σ 1 2 ) j 2 i ( P + σ 1 2 ) j ( i + 1 ) η 1 , i + 1 α k 1 α j 1 P ( σ 1 2 ) j k 1 ( P + σ 1 2 ) j k η 1 , k i = k j 2 α i α j 1 P ( σ 1 2 ) j 2 i ( P + σ 1 2 ) j ( i + 1 ) η 1 , i + 1 ,
Based on (A13), we can conclude that
E ( η 1 , k V j ) = E η 1 , k α k 1 α j 1 P ( σ 1 2 ) j k 1 ( P + σ 1 2 ) j k η 1 , k = α k 1 α j 1 P ( σ 1 2 ) j k ( P + σ 1 2 ) j k = ( d ) P σ 1 2 P + σ 1 2 j k 2 ,
where ( d ) follows from (A2). For E ( V k V j ) , we have
E ( V k V j ) = ( e ) E { [ α 1 α k 1 ( σ 1 2 P + σ 1 2 ) k 2 V 2 i = 1 k 2 α i α k 1 P ( σ 1 2 ) k 2 i ( P + σ 1 2 ) k ( i + 1 ) η 1 , i + 1 ] × [ α 1 α j 1 ( σ 1 2 P + σ 1 2 ) j 2 V 2 i = 1 k 2 α i α j 1 P ( σ 1 2 ) j 2 i ( P + σ 1 2 ) j ( i + 1 ) η 1 , i + 1 ] } = P α 1 α k 1 α 1 α j 1 ( σ 1 2 P + σ 1 2 ) k + j 4 + i = 1 k 2 α i α k 1 α i α j 1 ( P ) 2 ( σ 1 2 ) k + j 3 2 i ( P + σ 1 2 ) k + j 2 ( i + 1 ) = ( f ) P ( σ 1 2 P + σ 1 2 ) k + j 4 2 + i = 1 k 2 ( P ) 2 σ 1 2 ( σ 1 2 P + σ 1 2 ) k + j 2 ( i + 1 ) 2 = P ( σ 1 2 P + σ 1 2 ) j k 2 ,
where ( e ) follows from (A13), and ( f ) follows from (A2).
Hence, (A12) can be further calculated by
E ( η 1 , k η 1 , j ) = E ( V k V j ) + E ( η 1 , k V j ) = ( g ) 0 , 2 k N , k < j N ,
where ( g ) follows from (A15) and (A14).
According to (A16) and (A11),
| K | = P + σ w 2 + σ 1 2 0 0 0 P + σ w 2 + σ 1 2 0 0 0 P + σ w 2 + σ 1 2 ( N 1 ) × ( N 1 )
Therefore, we can obtain that
lim N 1 N 1 h ( η 1 , 2 N ) = lim N 1 2 ( N 1 ) log ( 2 π e ) N 1 | K | = 1 2 log 2 π e ( P + σ w 2 + σ 1 2 ) .
Analogously, we have
lim N 1 N 1 h ( η 1 , 2 N + η 2 , 2 N ) = 1 2 log 2 π e ( P + σ w 2 + σ 1 2 + σ 2 2 ) .
Substituting (A7), (A18) and (A19) into (A6), we prove that
lim N I ( A 2 N ; Y 2 N ) I ( A 2 N ; Z 2 N ) N 1 1 2 log 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 1 2 log 1 + ( P A + ρ 2 P ) 2 P ( 1 ρ 1 2 ρ 2 2 ) + ( σ w + ρ 1 P ) 2 + σ 1 2 + σ 2 2 ,
which completes the proof.

References

  1. Zaidi, A.; Vandendorpe, L. Coding schemes for relay-assisted information embedding. IEEE Trans. Inf. Forensics Secur. 2009, 4, 70–85. [Google Scholar] [CrossRef]
  2. Costa, M.H.M. Writing on dirty paper. IEEE Trans. Inf. Theory 1983, 29, 439–441. [Google Scholar] [CrossRef]
  3. Yan, W.; Yuan, X.; He, Z.; Kuai, X. Passive beamforming and information transfer design for reconfigurable intelligent surfaces aided multiuser MIMO systems. IEEE J. Sel. Areas Commun. 2020, 38, 1793–1808. [Google Scholar] [CrossRef]
  4. Weissman, T. Capacity of channels with action-dependent states. IEEE Trans. Inf. Theory 2010, 56, 5396–5411. [Google Scholar] [CrossRef]
  5. Dikstein, L.; Permuter, H.H.; Shamai, S. MAC with action-dependent state information at one encoder. IEEE Trans. Inf. Theory 2015, 61, 173–188. [Google Scholar] [CrossRef] [Green Version]
  6. Chen, Y.; Vinck, A.J.H. Wiretap channel with side information. IEEE Trans. Inf. Theory 2008, 54, 395–402. [Google Scholar] [CrossRef] [Green Version]
  7. Treust, M.L.; Zaidi, A.; Lasaulce, S. An achievable rate region for the broadcast channel with asymmetric side information. In Proceedings of the 49th Annual Allerton Conference on Communication, Control, and Computing, Urbana-Champaign, Monticello, IL, USA, 28–30 September 2011; pp. 68–75. [Google Scholar]
  8. El-Halabi, M.; Liu, T.; Georghiades, C.N.; Shamai (Shitz), S. Secret writing on dirty paper: A deterministic view. IEEE Trans. Inf. Theory 2012, 58, 3419–3429. [Google Scholar] [CrossRef] [Green Version]
  9. Mitrpant, C.; Vinck, A.; Luo, Y. An achievable region for the Gaussian wiretap channel with side information. IEEE Trans. Inf. Theory 2006, 52, 2181–2190. [Google Scholar] [CrossRef]
  10. Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  11. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  12. Csiszar, I.; Körner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
  13. Dai, B.; Li, C.; Liang, Y.; Ma, Z.; Shamai, S. Impact of action-dependent state and channel feedback on Gaussian wiretap channels. IEEE Trans. Inf. Theory 2020, 66, 3435–3455. [Google Scholar] [CrossRef]
  14. Zhang, H.; Yu, L.; Dai, B. Feedback schemes for the action dependent wiretap channel with noncausal state at the transmitter. Entropy 2019, 21, 278. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Zhang, H.; Yu, L.; Wei, C.; Dai, B. A new feedback scheme for the state-dependent wiretap channel with noncausal state at the transmitter. IEEE Access 2019, 7, 45594–45604. [Google Scholar] [CrossRef]
  16. Zaidi, A.; Awan, Z.H.; Shamai, S.; Vandendorpe, L. Secure degrees of Freedom of MIMO-X channels with output feedback and delayed CSIT. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1760–1774. [Google Scholar] [CrossRef] [Green Version]
  17. Schalkwijk, J.P.M.; Kailath, T. A coding scheme for additive noise channels with feedback. Part I: No bandwidth constraint. IEEE Trans. Inf. Theory 1966, 12, 172–182. [Google Scholar] [CrossRef]
  18. Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the International Symposium on Information Theory and Its Applications, ISITA, Auckland, New Zealand, 7–10 December 2008; pp. 1–6. [Google Scholar]
  19. Feinstein, A. A new basic theorem of information theory. IEEE Trans. Inf. Theory 1954, 4, 2–22. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The AD-DP-WTC with noiseless feedback.
Figure 1. The AD-DP-WTC with noiseless feedback.
Entropy 23 00929 g001
Figure 2. The new coding scheme of AD-DP-WTC with noiseless feedback.
Figure 2. The new coding scheme of AD-DP-WTC with noiseless feedback.
Entropy 23 00929 g002
Figure 3. Equivalentcoding scheme. (a) The equivalent channel model of the sub-message M 1 . (b) The equivalent channel model of the sub-message M 2 .
Figure 3. Equivalentcoding scheme. (a) The equivalent channel model of the sub-message M 1 . (b) The equivalent channel model of the sub-message M 2 .
Entropy 23 00929 g003
Figure 4. Comparison of the bounds on the secrecy capacity of AD-DP-WTC with feedback for P A = 10 , σ w 2 = 2000 , σ 1 2 = 30 , σ 2 2 = 100 , and P taking values in [ 0 , 30 ] .
Figure 4. Comparison of the bounds on the secrecy capacity of AD-DP-WTC with feedback for P A = 10 , σ w 2 = 2000 , σ 1 2 = 30 , σ 2 2 = 100 , and P taking values in [ 0 , 30 ] .
Entropy 23 00929 g004
Figure 5. Comparison of the bounds on the secrecy capacity of AD-DP-WTC with feedback for P A = 5 , σ w 2 = 240 , σ 1 2 = 30 , σ 2 2 = 2500 , and P taking values in [ 0 , 30 ] .
Figure 5. Comparison of the bounds on the secrecy capacity of AD-DP-WTC with feedback for P A = 5 , σ w 2 = 240 , σ 1 2 = 30 , σ 2 2 = 2500 , and P taking values in [ 0 , 30 ] .
Entropy 23 00929 g005
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xie, G.; Dai, B. New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy 2021, 23, 929. https://doi.org/10.3390/e23080929

AMA Style

Xie G, Dai B. New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy. 2021; 23(8):929. https://doi.org/10.3390/e23080929

Chicago/Turabian Style

Xie, Guangfen, and Bin Dai. 2021. "New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel" Entropy 23, no. 8: 929. https://doi.org/10.3390/e23080929

APA Style

Xie, G., & Dai, B. (2021). New Result on the Feedback Capacity of the Action-Dependent Dirty Paper Wiretap Channel. Entropy, 23(8), 929. https://doi.org/10.3390/e23080929

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop