TY - GEN
T1 - The multiple-access channel with an external eavesdropper
T2 - 49th Asilomar Conference on Signals, Systems and Computers, ACSSC 2015
AU - Goldenbaum, Mario
AU - Schaefer, Rafael F.
AU - Poor, H. Vincent
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/2/26
Y1 - 2016/2/26
N2 - In this paper, the multiple-access channel with an external eavesdropper is considered. From the perspective of the trustworthiness of users, an overview of existing secrecy criteria is given and their impact on the achievable secrecy rate region is discussed. For instance, under the assumption the eavesdropper has full a priori knowledge of the other users' transmit signals, the mixed secrecy criterion requires the information leakage from all transmitted messages individually as well as jointly to be small. This is a conservative criterion useful for scenarios in which users might be compromised. If some of the users are trustworthy, however, the secrecy criterion can be relaxed to joint secrecy resulting in a significantly increased rate region. As this indicates there is a trade-off between the choice of the secrecy criterion and achievable rates, the question is posed as to whether the criterion can further be weakened to individual secrecy, which would be desirable for scenarios where users are guaranteed trustworthy.
AB - In this paper, the multiple-access channel with an external eavesdropper is considered. From the perspective of the trustworthiness of users, an overview of existing secrecy criteria is given and their impact on the achievable secrecy rate region is discussed. For instance, under the assumption the eavesdropper has full a priori knowledge of the other users' transmit signals, the mixed secrecy criterion requires the information leakage from all transmitted messages individually as well as jointly to be small. This is a conservative criterion useful for scenarios in which users might be compromised. If some of the users are trustworthy, however, the secrecy criterion can be relaxed to joint secrecy resulting in a significantly increased rate region. As this indicates there is a trade-off between the choice of the secrecy criterion and achievable rates, the question is posed as to whether the criterion can further be weakened to individual secrecy, which would be desirable for scenarios where users are guaranteed trustworthy.
UR - http://www.scopus.com/inward/record.url?scp=84969822847&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84969822847&partnerID=8YFLogxK
U2 - 10.1109/ACSSC.2015.7421192
DO - 10.1109/ACSSC.2015.7421192
M3 - Conference contribution
AN - SCOPUS:84969822847
T3 - Conference Record - Asilomar Conference on Signals, Systems and Computers
SP - 564
EP - 568
BT - Conference Record of the 49th Asilomar Conference on Signals, Systems and Computers, ACSSC 2015
A2 - Matthews, Michael B.
PB - IEEE Computer Society
Y2 - 8 November 2015 through 11 November 2015
ER -