Abstract
In this paper, we propose two feedback coding schemes for the action-dependent wiretap channel with noncausal state at the transmitter. The first scheme follows from the already existing secret key based feedback coding scheme for the wiretap channel. The second one follows from our recently proposed hybrid feedback scheme for the wiretap channel. We show that, for the action-dependent wiretap channel with noncausal state at the transmitter, the second feedback scheme performs better than the first one, and the capacity results of this paper are further explained via a Gaussian example, which we call the action-dependent dirty paper wiretap channel with noiseless feedback.
Keywords: action-dependent channel, dirty paper channel, noiseless feedback, secrecy capacity, wiretap channel
1. Introduction
Using channel feedback to enhance the physical layer security (PLS) of a communication system was first proposed by Ahlswede and Cai [1], who re-visited the foundation of the PLS—the wiretap channel model [2]—by considering a noiseless feedback channel from the legitimate receiver to the transmitter. Ahlswede et al. [1] showed that, since the eavesdropper does not know the feedback, the legitimate receiver’s feedbackcan be used to generate secret keys shared between the transmitter and the legitimate receiver, and these keys can be used to encrypt the transmitted message. Using the feedback scheme in [1], it has been shown that the secrecy capacity (channel capacity with perfect secrecy constraint) of the wiretap channel can be enhanced. Furthermore, Ahlswede et al. [1] showed that this usage of feedback is optimal (achieving the secrecy capacity of the wiretap channel with noiseless feedback) if the channel is physically degraded (the eavesdropper’s received signal is a degraded version of the legitimate receiver’s). In recognition of this, Ardestanizadeh et al. [3] further pointed out that, if the noiseless feedback channel can be used to transmit anything the legitimate parties wish, the best choice of the legitimate parties is to send pure random bits (secret key) over the feedback channel. Subsequently, Schaefer et al. [4] extended the work of [3] to a broadcast situation, where two legitimate receivers of the broadcast channel independently send their secret keys to the transmitter via two noiseless feedback channels, and these keys help to enhance the achievable secrecy rate region of the broadcast wiretap channel [5]. Other related works in the PLS of the feedback channels include those by [6,7,8], who introduced channel state information (CSI) into various feedback channel models. Recently, Dai et al. [9] showed that, for the general wiretap channel (without physically degraded assumption), a better usage of the feedback is to generate not only key but also cooperative message from it, and this cooperative message helps the legitimate receiver to improve his decoding performance. Dai et al. [9] showed that this new feedback scheme achieves a larger achievable secrecy rate than the already existing secret key based feedback scheme [1] does.
Channel with noncausal state at the transmitter was first investigated by [10], and the capacity of this channel model was found by [11]. Subsequently, Costa et al. [12] studied the Gaussian case in [11], which is known as the dirty paper channel, and showed that the capacity of the dirty paper channel equals the capacity of the Gaussian channel without the state (also called interference). Here, note that the channel state in [10,11,12] is assumed to be independent of the transmitted message. In [13], the channel with noncausal or causal state available at the transmitter is revisited by considering the case that the transmitter can take actions on the channel state, i.e., the state is no longer independent of the transmitted message. This model is known as the action-dependent channel with states, and the capacity of this model is determined for both the noncausal and causal cases. Moreover, for the Gaussian case of the action-dependent channel with states (also called action-dependent dirty paper channel), it is shown that the actions on the state enhance the capacity of the dirty paper channel. Recently, a natural extension of the channel with noncausal state at the transmitter to the secrecy communication setting receives a lot of attention.Specifically, the authors of [14,15,16] studied the discrete memoryless wiretap channel with noncausal state at the transmitter, and proposed lower and upper bounds on its secrecy capacity. Mitrpant et al. [17] studied the Gaussian case in [14] (also called the dirty paper wiretap channel), and showed that the state (interference) non-causally known by the transmitter helps to enhance the secrecy capacity of the Gaussian wiretap channel [18]. Dai et al. [19] extended the state-dependent wiretap channel [14] to a broadcast situation, and proposed inner and outer bounds on the secrecy capacity region of this model. Dai et al. [20] studied the physically degraded action-dependent wiretap channel with noncausal state, and proposed lower and upper bounds on its secrecy capacity. Here, note that the action encoder in [20] is assumed to be deterministic, which implies that the output of the action encoder is a deterministic function of the transmitted message, and this leads to additional information leakage to the eavesdropper. Based on the work of [20,21] studied the feedback effect on the model proposed in [20]. A secret key based feedback scheme is provided in [21], and it is shown to be optimal for the physically degraded case.
In this paper, we study the action-dependent wiretap channel with noncausal state and noiseless feedback (the model of this paper can be viewed as the model of [21] without physically degraded assumption and with stochastic action encoder) (see Figure 1), and try to answer the following two fundamental questions:
-
(1)
How should the feedback scheme in [9] be extended to the action-dependent wiretap channel with noncausal state?
-
(2)
For the action-dependent wiretap channel with noncausal state, does the hybrid feedback scheme in [9] still gain advantages over the traditional one used in [1,2,3,4,5,6,7,8]?
Figure 1.
The action-dependent wiretap channel with noncausal state and noiseless feedback.
The main contribution of this paper includes:
-
(1)
We propose a new lower bound on the secrecy capacity of the action-dependent wiretap channel with noncausal state and noiseless feedback, which is constructed according to a hybrid feedback scheme similar to that in [9].
-
(2)
From a Gaussian example, which is also called the action-dependent dirty paper wiretap channel with noiseless feedback, we show that our new lower bound on the secrecy capacity is larger than the secret key based lower bound. Moreover, we find that our new lower bound achieves the secrecy capacity for some special cases.
The remainder of this paper is organized as follows. Section 2 is about the problem formulation and the main result of this paper. The achievability proof of our new lower bound on the secrecy capacity of the action-dependent wiretap channel with noncausal state and noiseless feedback is provided in Section 3. A Gaussian example and numerical results are provided in Section 4. Final conclusions are presented in Section 5.
2. Problem Formulation and New Result
Notations: For the rest of this manuscript, the random variables (RVs), values and alphabets are written in uppercase letters, lowercase letters and calligraphic letters, respectively. The random vectors and their values are denoted by a similar convention. For example, Y represents a RV, and y represents a value in the alphabet . Similarly, represents a random N-vector , and represents a vector value in (the Nth Cartesian power of ). In addition, for an event , its probability is denoted by . In the remainder of this manuscript, the base of the log function is 2.
Model description: In Figure 1, the channel is discrete memoryless, i.e., the overall channel transition probability is given by
| (1) |
where , , and . The message W is uniformly distributed in its alphabet , and a stochastic action encoder encodes W into an action sequence . The channel state sequence is generated through a discrete memoryless channel (DMC) with transition probability . Since is non-causally known by the channel encoder and the legitimate receiver’s channel output is sent back to the transmitter, the ith () channel input , where is a stochastic encoding function. The legitimate receiver produces an estimation ( is the legitimate receiver’s decoding function), and the average decoding error probability equals
| (2) |
The eavesdropper’s equivocation rate of the message W is formulated as
| (3) |
Given a positive number R, if for arbitrarily small and sufficiently large N, there exist a pair of channel encoder and decoder described above such that
| (4) |
we say R is achievable with weak perfect secrecy. The secrecy capacity consists of all achievable weak secrecy rates, and bounds on are given in the following theorems and corollary.
Theorem 1.
, where
(5) for , else , and the joint distribution is denoted by
(6)
Proof.
The lower bound is achieved by combining the binning scheme in [13] with the hybrid coding scheme in [9], and the details about the proof are in Section 3. ☐
The following lower bound in Corollary 1 can be directly obtained from Theorem 1 by letting V be constant, and this lower bound can be viewed as a secret key based lower bound (application of the secret key based feedback strategy [1] to the model of Figure 1) on .
Corollary 1.
, where
(7) and the joint distribution is denoted by
(8)
Remark 1.
Note that [21] also proposed a secret key based lower bound on the secrecy capacity of the physically degraded action-dependent wiretap channel with noncausal state and noiseless feedback. However, we should point out that the model studied in [21] assumes the action encoder is a deterministic encoder, i.e., if the eavesdropper knows , he also knows the message W. Hence, our lower bound generalizes that in [21] as the deterministic action encoder is a special case of the stochastic one studied in this paper and there is no physically degraded assumption in this paper.
Besides the above lower bounds on , the following theorem shows a simple upper bound on .
Theorem 2.
, where
(9) and the joint distribution is denoted by Equation (8).
Proof.
Since cannot exceed the capacity of the model in Figure 1 without eavesdropper, we know that is upper bounded by the capacity of the action-dependent channel with feedback. In [13], it has been shown that feedback does not increase the capacity of the action-dependent channel (), hence Theorem 2 is proved. The proof of Theorem 2 is completed. ☐
In Section 4, the above proposed hybrid lower bound ise compared with the secret key based lower bound via a Gaussian example, and we show which feedback strategy performs better.
3. Proof of Theorem 1
In this section, the hybrid feedback strategy for the wiretap channel [9] and the binning scheme for the action-dependent channel with noncausal state at the transmitter [13] are combined to show the achievability of Theorem 1. The rest of this section is organized as follows. The code-book construction and the transmission scheme are described in Section 3.1, and the equivocation analysis of the proposed scheme is shown in Section 3.2.
3.1. Code-Book Construction and Transmission Scheme
Definitions and notations:
Similar to the coding scheme in [9], suppose that the overall transmission consists of B blocks, and the codeword length in each block is N.
The overall message W is composed of B components (), and each component () is the message transmitted in block b. The value of belongs to the set . Next, split into two parts , and the values of and , respectively, belong to the sets and . Note that .
Analogously, the randomly produced dummy messages and , which are used to confuse the wiretapper, also consist of B components ( and ), and the components and () are transmitted in block b. Here, note that and are uniformly drawn from the sets and , respectively.
The auxiliary message , which is used to cooperate with the channel state, consists of B components (), and the value of () belongs to the set .
The help information and , which is used to ameliorate the legitimate receiver’s decoding performance, consists of B components ( and ), and the value of and (), respectively, belongs to the sets and .
In block b (), the random vectors , , , , , and are denoted by , , , , , and , respectively. In addition, let be a collection of the random vectors for all blocks. Analogously, we have , , , , and . The vector value is written in lower case letter.
Code-book generation:
In block b (), randomly produce i.i.d. codewords with respect to (w.r.t.) , and label them as , where , and .
In block b (), randomly produce i.i.d. codewords w.r.t. , and label them as , where , , , and .
For each possible value of and , randomly produce i.i.d. codewords on the basis of . Then, label these as , where and .
For given and , the transmitted sequence is i.i.d. produced on the basis of the probability .
Encoding scheme:
- For block 1, the transmitter chooses . Next, define , for given and the state sequence , the transmitter selects an index such that are jointly typical. If no such exists, declare an encoding error. If multiple exist, randomly pick out one. Based on the Covering Lemma [22], the encoding error tends to zero if
(10) - For block b (), before transmission, produce a mapping (this mapping is generated exactly the same as that in [1]). Based on this mapping, generate a random variable (RV) taking values in , and for . The RV is used as a secret key and it is not known to the eavesdropper, and is independent of the real transmitted messages and for block b. Notice that is a realization of . The mapping is revealed to all parties. First, since the transmitter knows its own , , and , he tries to find a such that are jointly typical. For the case that more than one exist, randomly pick one; if no such exists, declare an encoding error. According to the Covering Lemma [22], the encoding error approaches to zero if
where (1) is from the definition in Equation (6), which implies that . Next, the transmitter chooses . Finally, since the transmitter obtains , he extracts and tries to find a such that are jointly typical. If no such exists, declare an encoding error. If multiple exist, randomly pick out one. Based on the Covering Lemma [22], the encoding error tends to zero if Equation (10) holds. The codeword is picked for transmission.(11) At block B, first, the transmitter chooses . Next, after receiving the feedback , the transmitter tries to find a such that are jointly typical. After decoding such , the transmitter extracts and tries to find a such that are jointly typical. If no such exists, declare an encoding error. If multiple exist, randomly pick out one. The codeword is picked for transmission.
Decoding scheme:
The decoding procedure starts from block B. At block B, the legitimate receiver chooses a which is jointly typical with and . For the case that more than one or no such exists, declare a decoding error. Based on the Packing Lemma [22] and a similar argument in [13], this kind of decoding error approaches to zero when
| (12) |
After decoding , the legitimate receiver extracts from it. Then, he tries to select only one such that given , is jointly typical with . For the case that more than one or no such exist, declare a decoding error. Based on the Packing Lemma [22], this kind of decoding error approaches to zero when
| (13) |
After obtaining such unique , the legitimate receiver tries to find only one pair of such that are jointly typical. Based on the Packing Lemma [22] and a similar argument in [13], this kind of decoding error approaches to zero when
| (14) |
After decoding , the legitimate receiver picks out , , from it. Note that the legitimate receiver has full knowledge of , and hence he obtains the message . Analogously, the legitimate receiver decodes the messages , and the decoding procedure is completed. For convenience, the encoding and decoding schemes are explained by the following Figure 2 and Figure 3, respectively.
Figure 2.
The encoding procedure for all blocks.
Figure 3.
The decoding procedure for all blocks.
3.2. Equivocation Analysis
The overall equivocation , which is denoted by , is given by
| (15) |
where (a) is due to the definitions and .
The term in Equation (15) can be bounded by
| (16) |
where (b) is implied by , (c) is due to the construction of and the channel is memoryless, and (d) is due to that given and , the eavesdropper attempts to find a unique that is jointly typical with his own received signals , and according to the Packing Lemma [22], we can conclude that the eavesdropper’s decoding error tends to zero if
| (17) |
then applying Fano’s inequality, is obtained, where while .
Moreover, the term in Equation (15) can be bounded by
| (18) |
where (e) is due to the Markov chain , (f) follows by , and (g) is from the balanced coloring Lemma [9] (p. 264), i.e., given and , there are at least colors, which implies that
| (19) |
where , and approach to 0 as N goes to infinity.
Substituting Equations (16) and (18) into Equation (15), we have
| (20) |
The bound in Equation (20) indicates that if
| (21) |
can be proved by choosing sufficiently large B and N.
Now combining Equation (11) with Equation (13), we have
| (22) |
Next, from Equations (22), (10) and (14), we can conclude that
| (23) |
Then, implied by Equations (21) and (14), we have
| (24) |
Finally, applying Fourier–Motzkin elimination to remove , (), , , and from Equations (22), (23), (24), (12), (14), (17) and (21), Theorem 1 is proved.
4. The Action-Dependent Dirty Paper Wiretap Channel with Noiseless Feedback
The Gaussian case of the action-dependent wiretap channel with noncausal state at the transmitter and feedback, which we also call the action-dependent dirty paper wiretap channel with noiseless feedback, is depicted in Figure 4. At time i (), the inputs and outputs of this Gaussian model satisfy
| (25) |
where is the channel input subject to an average power constraint P, is the output of the action encoder subject to an average power constraint , t is a constant, and , , are independent Gaussian noises and are i.i.d. across the time index i. Here, note that , and . The secrecy capacity of the action-dependent dirty paper wiretap channel with feedback is denoted by , and the lower and upper bounds on will be given in the remainder of this section.
Figure 4.
The action-dependent dirty paper wiretap channel with noiseless feedback.
Before we show the bounds on , define
| (26) |
where , and G, A, W, , are independent of each other. Note that the definitions in Equation (26) are exactly the same as those in the action-dependent dirty paper channel [13]. Further, define
| (27) |
| (28) |
| (29) |
| (30) |
| (31) |
| (32) |
| (33) |
| (34) |
First, substituting Equations (26) and (25) into Equation (5), our new lower bound on is given by the following Theorem 3.
Theorem 3.
, where
(35) and for , else .
Second, substituting Equations (26) and (25) into Equation (7), the secret key based lower bound on is given by the following Theorem 4.
Theorem 4.
, where
(36) and for , else .
Third, substituting Equations (26) and (25) into Equation (9), the upper bound on is given by Theorem 5.
Theorem 5.
, where
(37)
Proof.
Here note that Equation (9) is also the capacity of the action-dependent channel with noncausal state at the transmitter, and the capacity formula of its Gaussian case is be given in [13] by substituting Equations (26) and (25) into Equation (9) and maximizing the parameters and . Now, directly using the Gaussian capacity formula in [13], we have Equation (37). The proof is completed. ☐
Finally, to show the feedback gain, we also provide a lower bound on the secrecy capacity of the action-dependent dirty paper wiretap channel (see Theorem 6).
Theorem 6.
, where
(38)
Proof.
In [20], a lower bound on the secrecy capacity of the discrete memoryless action-dependent wiretap channel with noncausal state at the transmitter is provided, and it is given by
(39) Here, note that the term in Equation (39) holds due to the assumption that the action encoder is a deterministic function of the transmitted message. Specifically, once the eavesdropper obtains the action sequence , he knows the transmitted message, hence the achievable secrecy rate cannot exceed the eavesdropper’s uncertainty about , i.e., .
In this paper, we use a stochastic action encoder instead of the deterministic one in [20], which indicates that, even if the eavesdropper obtains , he does not know the transmitted message due to the randomness assumption of the action encoder. Hence. the term no longer holds in this paper, i.e., for the action-dependent wiretap channel with noncausal state at the transmitter and stochastic action encoder, a lower bound is given by
(40) Finally, substituting Equations (26) and (25) into Equations (40), Equation (38) is obtained. The proof is completed. ☐
Figure 5 depicts the bounds on and the lower bound on the secrecy capacity of the action-dependent dirty paper wiretap channel for , , , and several values of P. For this case, we see that there is no positive achievable secrecy rate of the action-dependent dirty paper wiretap channel, and feedback enhances . Moreover, we see that the hybrid feedback scheme performs better than the secret key based feedback scheme, and there exists a gap between the lower and upper bounds on when P is sufficiently large.
Figure 5.
Comparison of the bounds on for , , , , and P taking values in .
Figure 6 depicts the bounds on and the lower bound on the secrecy capacity of the action-dependent dirty paper wiretap channel for , , , and P taking values in . For this case, we see that feedback enhances , and the hybrid feedback scheme performs better than the secret key based feedback scheme. Moreover, we see that, when P is small, the hybrid feedback scheme is optimal, i.e., its corresponding lower bound meets the upper bound, which implies that the secrecy capacity is determined for this case. Figure 7 is an extension of Figure 6 with P taking values in . We see that, when P is sufficiently large, there exists a gap between the lower and upper bounds on , and eliminating this gap still has a long way to go.
Figure 6.
Comparison of the bounds on for , , , , and P taking values in .
Figure 7.
Comparison of the bounds on for , , , , and P taking values in .
5. Conclusions
In this paper, we propose two achievable secrecy rates for the action-dependent wiretap channel with noncausal state at the transmitter and feedback, where one rate is achieved by using the already existing secret key based feedback strategy, and the other is achieved by using a hybrid feedback strategy. From a Gaussian example (also called the action-dependent dirty paper wiretap channel with feedback), we show that both feedback strategies proposed in this paper enhance the achievable secrecy rate of the action-dependent dirty paper wiretap channel, and the hybrid feedback strategy performs better than the secret key based feedback strategy. Moreover, we show that the hybrid feedback strategy is optimal for some special cases.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grants 61671391 and U1734209), the China Scholarship Council (file No. 201807005013), and the 111 Project No. 111-2-14.
Abbreviations
The following abbreviations are used in this manuscript:
| MDPI | Multidisciplinary Digital Publishing Institute |
| DOAJ | Directory of open access journals |
| TLA | Three letter acronym |
| LD | linear dichroism |
Author Contributions
H.Z. did the theoretical work, performed the experiments, analyzed the data and drafted the work; B.D. designed the work, performed the theoretical work, analyzed the data, interpreted the data for the work and revised the work; and L.Y. performed the theoretical work, interpreted the data for the work and revised the work. All authors approved the version to be published and agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.
Conflicts of Interest
The authors declare no conflict of interest.
References
- 1.Ahlswede R., Cai N. General Theory of Information Transfer and Combinatorics. Springer; Berlin/Heidelberg, Germany: 2006. Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder; pp. 258–275. [Google Scholar]
- 2.Wyner A.D. The wire-tap channel. Bell Syst. Tech. J. 1975;54:1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x. [DOI] [Google Scholar]
- 3.Ardestanizadeh E., Franceschetti M., Javidi T., Kim Y. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory. 2009;55:5353–5361. doi: 10.1109/TIT.2009.2032814. [DOI] [Google Scholar]
- 4.Schaefer R.F., Khisti A., Poor H.V. Secure broadcasting using independent secret keys. IEEE Trans. Commun. 2018;66:644–661. doi: 10.1109/TCOMM.2017.2764892. [DOI] [Google Scholar]
- 5.Ekrem E., Ulukus S. Secrecy capacity of a class of broadcast channels with an eavesdropper. EURASIP J. Wirel. Commun. Netw. 2009;2009:1–29. doi: 10.1155/2009/824235. [DOI] [Google Scholar]
- 6.Cohen A., Cohen A. Wiretap channel with causal state information and secure rate-limited feedback. IEEE Trans. Commun. 2016;64:1192–1203. doi: 10.1109/TCOMM.2016.2515619. [DOI] [Google Scholar]
- 7.Dai B., Ma Z., Luo Y. Finite state Markov wiretap channel with delayed feedback. IEEE Trans. Inf. Forensics Secur. 2017;12:746–760. doi: 10.1109/TIFS.2016.2636085. [DOI] [Google Scholar]
- 8.Dai B., Ma Z., Xiao M., Tang X., Fan P. Secure communication over finite state multiple-access wiretap channel with delayed feedback. IEEE J. Sel. Areas Commun. 2018;36:723–736. doi: 10.1109/JSAC.2018.2824938. [DOI] [Google Scholar]
- 9.Dai B., Luo Y. An improved feedback coding scheme for the wiretap channel. IEEE Trans. Inf. Forensics Secur. 2019;14:262–271. doi: 10.1109/TIFS.2018.2849978. [DOI] [Google Scholar]
- 10.Kuznetsov N.V., Tsybakov B.S. Coding in memories with defective cells. Probl. Control Inf. Theory. 1974;10:52–60. [Google Scholar]
- 11.Gel’fand S.I., Pinsker M.S. Coding for channel with random parameters. Probl. Control Inf. Theory. 1980;9:19–31. [Google Scholar]
- 12.Costa M.H.M. Writing on dirty paper. IEEE Trans. Inf. Theory. 1983;29:439–441. doi: 10.1109/TIT.1983.1056659. [DOI] [Google Scholar]
- 13.Weissman T. Capacity of channels with action-dependent states. IEEE Trans. Inf. Theory. 2010;56:5396–5411. doi: 10.1109/TIT.2010.2068991. [DOI] [Google Scholar]
- 14.Chen Y., Han Vinck A.J. Wiretap channel with side information. IEEE Trans. Inf. Theory. 2008;54:395–402. doi: 10.1109/TIT.2007.911157. [DOI] [Google Scholar]
- 15.Dai B., Luo Y. Some new results on wiretap channel with side information. Entropy. 2012;14:1671–1702. doi: 10.3390/e14091671. [DOI] [Google Scholar]
- 16.El-Halabi M., Liu T., Georghiades C.N., Shamai S. Secret writing on dirty paper: A deterministic view. IEEE Trans. Inf. Theory. 2012;58:3419–3429. doi: 10.1109/TIT.2012.2190820. [DOI] [Google Scholar]
- 17.Mitrpant C., Han Vinck A.J., Luo Y. An achievable region for the gaussian wiretap channel with side information. IEEE Trans. Inf. Theory. 2006;52:2181–2190. doi: 10.1109/TIT.2006.872968. [DOI] [Google Scholar]
- 18.Leung-Yan-Cheong S.K., Hellman M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory. 1978;24:451–456. doi: 10.1109/TIT.1978.1055917. [DOI] [Google Scholar]
- 19.Dai B., Ma Z., Fang X. Feedback enhances the security of state-dependent degraded broadcast channels with confidential messages. IEEE Trans. Inf. Forensics Secur. 2015;10:1529–1542. doi: 10.1109/TIFS.2015.2419182. [DOI] [Google Scholar]
- 20.Dai B., Han Vinck A.J., Luo Y., Tang X. Wiretap channel with action-dependent channel state information. Entropy. 2013;15:445–473. doi: 10.3390/e15020445. [DOI] [Google Scholar]
- 21.Dai B., Han Vinck A.J., Luo Y. Wiretap channel in the presence of action-dependent states and noiseless feedback. J. Appl. Math. 2013;2013:1–17. doi: 10.1155/2013/423619. [DOI] [Google Scholar]
- 22.El Gamal A., Kim Y.H. Network Information Theory. Cambridge University Press; Cambridge, UK: 2011. Information measures and typicality; pp. 17–37. [Google Scholar]







