Skip to main content
Entropy logoLink to Entropy
. 2019 Mar 13;21(3):278. doi: 10.3390/e21030278

Feedback Schemes for the Action-Dependent Wiretap Channel with Noncausal State at the Transmitter

Haonan Zhang 1,, Linman Yu 2,, Bin Dai 1,*,
PMCID: PMC7514758  PMID: 33266993

Abstract

In this paper, we propose two feedback coding schemes for the action-dependent wiretap channel with noncausal state at the transmitter. The first scheme follows from the already existing secret key based feedback coding scheme for the wiretap channel. The second one follows from our recently proposed hybrid feedback scheme for the wiretap channel. We show that, for the action-dependent wiretap channel with noncausal state at the transmitter, the second feedback scheme performs better than the first one, and the capacity results of this paper are further explained via a Gaussian example, which we call the action-dependent dirty paper wiretap channel with noiseless feedback.

Keywords: action-dependent channel, dirty paper channel, noiseless feedback, secrecy capacity, wiretap channel

1. Introduction

Using channel feedback to enhance the physical layer security (PLS) of a communication system was first proposed by Ahlswede and Cai [1], who re-visited the foundation of the PLS—the wiretap channel model [2]—by considering a noiseless feedback channel from the legitimate receiver to the transmitter. Ahlswede et al. [1] showed that, since the eavesdropper does not know the feedback, the legitimate receiver’s feedbackcan be used to generate secret keys shared between the transmitter and the legitimate receiver, and these keys can be used to encrypt the transmitted message. Using the feedback scheme in [1], it has been shown that the secrecy capacity (channel capacity with perfect secrecy constraint) of the wiretap channel can be enhanced. Furthermore, Ahlswede et al. [1] showed that this usage of feedback is optimal (achieving the secrecy capacity of the wiretap channel with noiseless feedback) if the channel is physically degraded (the eavesdropper’s received signal is a degraded version of the legitimate receiver’s). In recognition of this, Ardestanizadeh et al. [3] further pointed out that, if the noiseless feedback channel can be used to transmit anything the legitimate parties wish, the best choice of the legitimate parties is to send pure random bits (secret key) over the feedback channel. Subsequently, Schaefer et al. [4] extended the work of [3] to a broadcast situation, where two legitimate receivers of the broadcast channel independently send their secret keys to the transmitter via two noiseless feedback channels, and these keys help to enhance the achievable secrecy rate region of the broadcast wiretap channel [5]. Other related works in the PLS of the feedback channels include those by [6,7,8], who introduced channel state information (CSI) into various feedback channel models. Recently, Dai et al. [9] showed that, for the general wiretap channel (without physically degraded assumption), a better usage of the feedback is to generate not only key but also cooperative message from it, and this cooperative message helps the legitimate receiver to improve his decoding performance. Dai et al. [9] showed that this new feedback scheme achieves a larger achievable secrecy rate than the already existing secret key based feedback scheme [1] does.

Channel with noncausal state at the transmitter was first investigated by [10], and the capacity of this channel model was found by [11]. Subsequently, Costa et al. [12] studied the Gaussian case in [11], which is known as the dirty paper channel, and showed that the capacity of the dirty paper channel equals the capacity of the Gaussian channel without the state (also called interference). Here, note that the channel state in [10,11,12] is assumed to be independent of the transmitted message. In [13], the channel with noncausal or causal state available at the transmitter is revisited by considering the case that the transmitter can take actions on the channel state, i.e., the state is no longer independent of the transmitted message. This model is known as the action-dependent channel with states, and the capacity of this model is determined for both the noncausal and causal cases. Moreover, for the Gaussian case of the action-dependent channel with states (also called action-dependent dirty paper channel), it is shown that the actions on the state enhance the capacity of the dirty paper channel. Recently, a natural extension of the channel with noncausal state at the transmitter to the secrecy communication setting receives a lot of attention.Specifically, the authors of [14,15,16] studied the discrete memoryless wiretap channel with noncausal state at the transmitter, and proposed lower and upper bounds on its secrecy capacity. Mitrpant et al. [17] studied the Gaussian case in [14] (also called the dirty paper wiretap channel), and showed that the state (interference) non-causally known by the transmitter helps to enhance the secrecy capacity of the Gaussian wiretap channel [18]. Dai et al. [19] extended the state-dependent wiretap channel [14] to a broadcast situation, and proposed inner and outer bounds on the secrecy capacity region of this model. Dai et al. [20] studied the physically degraded action-dependent wiretap channel with noncausal state, and proposed lower and upper bounds on its secrecy capacity. Here, note that the action encoder in [20] is assumed to be deterministic, which implies that the output of the action encoder is a deterministic function of the transmitted message, and this leads to additional information leakage to the eavesdropper. Based on the work of [20,21] studied the feedback effect on the model proposed in [20]. A secret key based feedback scheme is provided in [21], and it is shown to be optimal for the physically degraded case.

In this paper, we study the action-dependent wiretap channel with noncausal state and noiseless feedback (the model of this paper can be viewed as the model of [21] without physically degraded assumption and with stochastic action encoder) (see Figure 1), and try to answer the following two fundamental questions:

  • (1)

    How should the feedback scheme in [9] be extended to the action-dependent wiretap channel with noncausal state?

  • (2)

    For the action-dependent wiretap channel with noncausal state, does the hybrid feedback scheme in [9] still gain advantages over the traditional one used in [1,2,3,4,5,6,7,8]?

Figure 1.

Figure 1

The action-dependent wiretap channel with noncausal state and noiseless feedback.

The main contribution of this paper includes:

  • (1)

    We propose a new lower bound on the secrecy capacity of the action-dependent wiretap channel with noncausal state and noiseless feedback, which is constructed according to a hybrid feedback scheme similar to that in [9].

  • (2)

    From a Gaussian example, which is also called the action-dependent dirty paper wiretap channel with noiseless feedback, we show that our new lower bound on the secrecy capacity is larger than the secret key based lower bound. Moreover, we find that our new lower bound achieves the secrecy capacity for some special cases.

The remainder of this paper is organized as follows. Section 2 is about the problem formulation and the main result of this paper. The achievability proof of our new lower bound on the secrecy capacity of the action-dependent wiretap channel with noncausal state and noiseless feedback is provided in Section 3. A Gaussian example and numerical results are provided in Section 4. Final conclusions are presented in Section 5.

2. Problem Formulation and New Result

Notations: For the rest of this manuscript, the random variables (RVs), values and alphabets are written in uppercase letters, lowercase letters and calligraphic letters, respectively. The random vectors and their values are denoted by a similar convention. For example, Y represents a RV, and y represents a value in the alphabet Y. Similarly, YN represents a random N-vector (Y1,...,YN), and yN=(y1,...,yN) represents a vector value in YN (the Nth Cartesian power of Y). In addition, for an event X=x, its probability is denoted by P(x). In the remainder of this manuscript, the base of the log function is 2.

Model description: In Figure 1, the channel is discrete memoryless, i.e., the overall channel transition probability is given by

P(yN,zN|xN,sN)=i=1NP(zi,yi|xi,si), (1)

where siS, xiX, yiY and ziZ. The message W is uniformly distributed in its alphabet W={1,2,...,|W|}, and a stochastic action encoder encodes W into an action sequence AN. The channel state sequence SN is generated through a discrete memoryless channel (DMC) ANSN with transition probability P(s|a). Since SN is non-causally known by the channel encoder and the legitimate receiver’s channel output is sent back to the transmitter, the ith (i{1,2,...,N}) channel input Xi=fi(W,SN,Yi-1), where fi is a stochastic encoding function. The legitimate receiver produces an estimation W^=ψ(YN) (ψ is the legitimate receiver’s decoding function), and the average decoding error probability equals

Pe=1|W|iWPr{ψ(yN)i|isent}. (2)

The eavesdropper’s equivocation rate of the message W is formulated as

Δ=1NH(W|ZN). (3)

Given a positive number R, if for arbitrarily small ϵ and sufficiently large N, there exist a pair of channel encoder and decoder described above such that

log|W|NR-ϵ,ΔR-ϵ,Peϵ, (4)

we say R is achievable with weak perfect secrecy. The secrecy capacity Csaf consists of all achievable weak secrecy rates, and bounds on Csaf are given in the following theorems and corollary.

Theorem 1.

CsafRsaf*, where

Rsaf*=maxmin{I(U;Y)-I(U;S|A),[I(U;V,Y)-I(U;Z)]++H(Y|U,Z)}, (5)

[x]+=x for x0, else [x]+=0, and the joint distribution is denoted by

P(u,v,a,s,x,y,z)=P(v|u,y)P(y,z|x,s)P(x|u,s)P(u|a,s)P(a,s). (6)

Proof. 

The lower bound Rsaf* is achieved by combining the binning scheme in [13] with the hybrid coding scheme in [9], and the details about the proof are in Section 3. ☐

The following lower bound Rsaf** in Corollary 1 can be directly obtained from Theorem 1 by letting V be constant, and this lower bound can be viewed as a secret key based lower bound (application of the secret key based feedback strategy [1] to the model of Figure 1) on Csaf.

Corollary 1.

CsafRsaf**, where

Rsaf**=maxmin{I(U;Y)-I(U;S|A),[I(U;Y)-I(U;Z)]++H(Y|U,Z)}, (7)

and the joint distribution is denoted by

P(u,a,s,x,y,z)=P(y,z|x,s)P(x|u,s)P(u|a,s)P(a,s). (8)

Remark 1.

Note that [21] also proposed a secret key based lower bound on the secrecy capacity of the physically degraded action-dependent wiretap channel with noncausal state and noiseless feedback. However, we should point out that the model studied in [21] assumes the action encoder is a deterministic encoder, i.e., if the eavesdropper knows AN, he also knows the message W. Hence, our lower bound Rsaf** generalizes that in [21] as the deterministic action encoder is a special case of the stochastic one studied in this paper and there is no physically degraded assumption in this paper.

Besides the above lower bounds on Csaf, the following theorem shows a simple upper bound on Csaf.

Theorem 2.

CsafCsaf-out, where

Csaf-out=max(I(U;Y)-I(U;S|A)), (9)

and the joint distribution is denoted by Equation (8).

Proof. 

Since Csaf cannot exceed the capacity of the model in Figure 1 without eavesdropper, we know that Csaf is upper bounded by the capacity of the action-dependent channel with feedback. In [13], it has been shown that feedback does not increase the capacity of the action-dependent channel (max(I(U;Y)-I(U;S|A))), hence Theorem 2 is proved. The proof of Theorem 2 is completed. ☐

In Section 4, the above proposed hybrid lower bound Rsaf* ise compared with the secret key based lower bound Rsaf** via a Gaussian example, and we show which feedback strategy performs better.

3. Proof of Theorem 1

In this section, the hybrid feedback strategy for the wiretap channel [9] and the binning scheme for the action-dependent channel with noncausal state at the transmitter [13] are combined to show the achievability of Theorem 1. The rest of this section is organized as follows. The code-book construction and the transmission scheme are described in Section 3.1, and the equivocation analysis of the proposed scheme is shown in Section 3.2.

3.1. Code-Book Construction and Transmission Scheme

Definitions and notations:

  • Similar to the coding scheme in [9], suppose that the overall transmission consists of B blocks, and the codeword length in each block is N.

  • The overall message W is composed of B components (W=(W1,...,WB)), and each component Wb (b{1,2,...,B}) is the message transmitted in block b. The value of Wb belongs to the set {1,...,2NR}. Next, split Wb into two parts Wb=(Wb,1,Wb,2), and the values of Wb,1 and Wb,2, respectively, belong to the sets {1,...,2NR1} and {1,...,2NR2}. Note that R1+R2=R.

  • Analogously, the randomly produced dummy messages W and W, which are used to confuse the wiretapper, also consist of B components (W=(W1,...,WB) and W=(W1,...,WB)), and the components Wb and Wb (b{1,2,...,B}) are transmitted in block b. Here, note that Wb and Wb are uniformly drawn from the sets {1,...,2NR} and {1,...,2NR}, respectively.

  • The auxiliary message W*, which is used to cooperate with the channel state, consists of B components (W*=(W1*,...,WB*)), and the value of Wb* (b{1,2,...,B}) belongs to the set {1,...,2NR*}.

  • The help information W** and W***, which is used to ameliorate the legitimate receiver’s decoding performance, consists of B components (W**=(W1**,...,WB**) and W***=(W1***,...,WB***)), and the value of Wb** and Wb*** (b{1,2,...,B}), respectively, belongs to the sets {1,...,2NR**} and {1,...,2NR***}.

  • In block b (1bB), the random vectors AN, XN, YN, ZN, SN, UN and VN are denoted by A¯b, X¯b, Y¯b, Z¯b, S¯b, U¯b and V¯b, respectively. In addition, let XB=(X¯1,...,X¯B) be a collection of the random vectors XN for all blocks. Analogously, we have AB=(A¯1,...,A¯B), YB=(Y¯1,...,Y¯B), ZB=(Z¯1,...,Z¯B), SB=(S¯1,...,S¯B), UB=(U¯1,...,U¯B) and VB=(V¯1,...,V¯B). The vector value is written in lower case letter.

Code-book generation:

  • In block b (1bB), randomly produce 2N(R1+R2+R) i.i.d. codewords a¯b with respect to (w.r.t.) P(a), and label them as a¯b(wb,1,wb,2,wb), where wb,1{1,2,...,2NR1}, wb,2{1,2,...,2NR2} and wb{1,2,...,2NR}.

  • In block b (1bB), randomly produce 2N(R1+R2+R+R*+R**) i.i.d. codewords u¯b w.r.t. P(u|a,s), and label them as u¯b(wb,1,wb,2,wb,wb*,wb-1**), where wb,1{1,2,...,2NR1}, wb,2{1,2,...,2NR2}, wb{1,2,...,2NR}, wb*{1,2,...,2NR*} and wb-1**{1,2,...,2NR**}.

  • For each possible value of u¯b(wb,1,wb,2,wb,wb*,wb-1**) and y¯b, randomly produce 2N(R**+R***) i.i.d. codewords v¯b on the basis of P(v|u,y). Then, label these v¯b as v¯b(wb**,wb***), where wb**{1,2,...,2NR**} and wb***{1,2,...,2NR***}.

  • For given u¯b and s¯b, the transmitted sequence x¯b is i.i.d. produced on the basis of the probability P(x|u,s).

Encoding scheme:

  • For block 1, the transmitter chooses a¯1(w1,1,w1,2=1,w1). Next, define w0**=1, for given a¯1(w1,1,w1,2=1,w1) and the state sequence s¯1, the transmitter selects an index w1* such that (u¯1(w1,1,w1,2=1,w1,w1*,w0**=1),a¯1(w1,1,w1,2=1,w1),s¯1) are jointly typical. If no such w1* exists, declare an encoding error. If multiple w1* exist, randomly pick out one. Based on the Covering Lemma [22], the encoding error tends to zero if
    R*>I(U;S|A). (10)
  • For block b (i{2,3,...,B-1}), before transmission, produce a mapping gb:y¯b-1{1,2,...,2NR2} (this mapping is generated exactly the same as that in [1]). Based on this mapping, generate a random variable (RV) Kb=gb(Y¯b-1) taking values in {1,2,...,2NR2}, and Pr{Kb=j}=2-NR2 for j{1,2,...,2NR2}. The RV Kb is used as a secret key and it is not known to the eavesdropper, and Kb is independent of the real transmitted messages Wb,1 and Wb,2 for block b. Notice that kb=gb(y¯b-1){1,2,...,2NR2} is a realization of Kb. The mapping gb is revealed to all parties. First, since the transmitter knows its own u¯b-1(wb-1,1,wb-1,2kb-1,wb-1,wb-1*,wb-2**), a¯b-1(wb-1,1,wb-1,2,wb-1), s¯b-1 and y¯b-1, he tries to find a v¯b-1(wb-1**,wb-1***) such that (v¯b-1,u¯b-1,y¯b-1,s¯b-1,a¯b-1) are jointly typical. For the case that more than one v¯b-1 exist, randomly pick one; if no such v¯b-1 exists, declare an encoding error. According to the Covering Lemma [22], the encoding error approaches to zero if
    R**+R***I(V;U,Y,A,S)=(1)I(V;U,Y), (11)
    where (1) is from the definition in Equation (6), which implies that V(U,Y)(A,S). Next, the transmitter chooses a¯b(wb,1,wb,2,wb). Finally, since the transmitter obtains v¯b-1(wb-1**,wb-1***), he extracts wb-1** and tries to find a wb* such that (u¯b(wb,1,wb,2kb,wb,wb*,wb-1**),a¯b(wb,1,wb,2,wb),s¯b) are jointly typical. If no such wb* exists, declare an encoding error. If multiple wb* exist, randomly pick out one. Based on the Covering Lemma [22], the encoding error tends to zero if Equation (10) holds. The codeword u¯b(wb,1,wb,2kb,wb,wb*,wb-1**) is picked for transmission.
  • At block B, first, the transmitter chooses a¯B(1,1,1). Next, after receiving the feedback y¯B-1, the transmitter tries to find a v¯B-1(wB-1**,wB-1***) such that (v¯B-1(wB-1**,wB-1***),u¯B-1,y¯B-1,s¯B-1,a¯B-1) are jointly typical. After decoding such v¯B-1(wB-1**,wB-1***), the transmitter extracts wB-1** and tries to find a wB* such that (u¯B(1,1,1,wB*,wB-1**),a¯B(1,1,1),s¯B) are jointly typical. If no such wB* exists, declare an encoding error. If multiple wB* exist, randomly pick out one. The codeword u¯B(1,1,1,wB*,wB-1**) is picked for transmission.

Decoding scheme:

The decoding procedure starts from block B. At block B, the legitimate receiver chooses a u¯B(1,1,1,wB*,wB-1**) which is jointly typical with y¯B and a¯B(1,1,1). For the case that more than one or no such u¯B exists, declare a decoding error. Based on the Packing Lemma [22] and a similar argument in [13], this kind of decoding error approaches to zero when

R*+R**I(U;Y). (12)

After decoding u¯B, the legitimate receiver extracts wB-1** from it. Then, he tries to select only one v¯B-1(wB-1**,wB-1***) such that given wB-1**, v¯B-1 is jointly typical with y¯B-1. For the case that more than one or no such v¯B-1 exist, declare a decoding error. Based on the Packing Lemma [22], this kind of decoding error approaches to zero when

R***I(V;Y). (13)

After obtaining such unique v¯B-1, the legitimate receiver tries to find only one pair of (u¯B-1,a¯B-1) such that (y¯B-1,a¯B-1,v¯B-1,u¯B-1) are jointly typical. Based on the Packing Lemma [22] and a similar argument in [13], this kind of decoding error approaches to zero when

R1+R2+R+R*+R**+RI(U;V,Y). (14)

After decoding u¯B-1, the legitimate receiver picks out wB-1,1, wB-1,2kB-1, wB-2** from it. Note that the legitimate receiver has full knowledge of kB-1=gB-1(y¯B-2), and hence he obtains the message wB-1=(wB-1,1,wB-1,2). Analogously, the legitimate receiver decodes the messages wB-2,wB-3,...,w1, and the decoding procedure is completed. For convenience, the encoding and decoding schemes are explained by the following Figure 2 and Figure 3, respectively.

Figure 2.

Figure 2

The encoding procedure for all blocks.

Figure 3.

Figure 3

The decoding procedure for all blocks.

3.2. Equivocation Analysis

The overall equivocation Δ, which is denoted by Δ=1BNH(W|ZB), is given by

Δ=(a)1BN(H(W˜1|ZB)+H(W˜2|ZB,W˜1)), (15)

where (a) is due to the definitions W˜1=(W1,1,...,WB,1) and W˜2=(W1,2,...,WB,2).

The term H(W˜1|ZB) in Equation (15) can be bounded by

H(W˜1|ZB)=H(W˜1,ZB)-H(ZB)=H(W˜1,ZB,UB)-H(UB|W˜1,ZB)-H(ZB)=(b)H(UB)-H(UB|W˜1,ZB)-I(UB;ZB)=(c)(B-1)NR1+(B-2)NR2+(B-1)NR+BNR*+(B-1)NR**-BNI(U;Z)-H(UB|W˜1,ZB)(d)(B-1)NR1+(B-2)NR2+(B-1)NR+BNR*+(B-1)NR**-BNI(U;Z)-BNϵ3, (16)

where (b) is implied by H(W˜1|UB)=0, (c) is due to the construction of UB and the channel is memoryless, and (d) is due to that given w˜1 and zB, the eavesdropper attempts to find a unique uB that is jointly typical with his own received signals zB, and according to the Packing Lemma [22], we can conclude that the eavesdropper’s decoding error tends to zero if

R2+R+R*+R**I(U;Z), (17)

then applying Fano’s inequality, 1BNH(UB|W˜1,ZB)ϵ3 is obtained, where ϵ30 while B,N.

Moreover, the term H(W˜2|ZB,W˜1) in Equation (15) can be bounded by

H(W˜2|ZB,W˜1)i=2B-1H(Wi,2|ZB,W˜1,W1,2=1,...,Wi-1,2,Wi,2Ki)=(e)i=2B-1H(Wi,2|Z¯i-1,Wi,2Ki)i=2B-1H(Wi,2|Z¯i-1,U¯i-1,Wi,2Ki)=i=2B-1H(Ki|Z¯i-1,U¯i-1,Wi,2Ki)=(f)i=2B-1H(Ki|Z¯i-1,U¯i-1)(g)(B-2)(log1-ϵ11+δ+N(1-ϵ2)H(Y|U,Z)), (18)

where (e) is due to the Markov chain Wi,2(Z¯i-1,Wi,2Ki)(W˜1,W1,2,...,Wi-1,2,Z¯1,...,Z¯i-2,Z¯i,...,Z¯B), (f) follows by Ki(Z¯i-1,U¯i-1)Wi,2Ki, and (g) is from the balanced coloring Lemma [9] (p. 264), i.e., given z¯i-1 and u¯i-1, there are at least γ1+δ colors, which implies that

H(Ki|Z¯i-1,U¯i-1)log1-ϵ11+δ+N(1-ϵ2)H(Y|U,Z), (19)

where ϵ1, ϵ2 and δ approach to 0 as N goes to infinity.

Substituting Equations (16) and (18) into Equation (15), we have

ΔR*+B-1B(R1+R+R**)+B-2BR2-I(U;Z)-ϵ3+B-2BNlog1-ϵ11+δ+B-2B(1-ϵ2)H(Y|U,Z). (20)

The bound in Equation (20) indicates that if

R+R*+R**I(U;Z)-H(Y|U,Z), (21)

ΔR1+R2-ϵ can be proved by choosing sufficiently large B and N.

Now combining Equation (11) with Equation (13), we have

R**I(U,Y;V)-I(Y;V)=I(V;U|Y). (22)

Next, from Equations (22), (10) and (14), we can conclude that

R1+R2+R+RI(Y,V;U)-I(V;U|Y)-I(U;S|A)=I(U;Y)-I(U;S|A). (23)

Then, implied by Equations (21) and (14), we have

R1+R2+RI(Y,V;U)-I(U;Z)+H(Y|U,Z). (24)

Finally, applying Fourier–Motzkin elimination to remove R1, R2 (R=R1+R2), R, R, R* and R** from Equations (22), (23), (24), (12), (14), (17) and (21), Theorem 1 is proved.

4. The Action-Dependent Dirty Paper Wiretap Channel with Noiseless Feedback

The Gaussian case of the action-dependent wiretap channel with noncausal state at the transmitter and feedback, which we also call the action-dependent dirty paper wiretap channel with noiseless feedback, is depicted in Figure 4. At time i (i{1,2,...,N}), the inputs and outputs of this Gaussian model satisfy

Si=Ai+Wi,Yi=Xi+Si+η1,i,Zi=Xi+tSi+η2,i, (25)

where Xi is the channel input subject to an average power constraint P, Ai is the output of the action encoder subject to an average power constraint PA, t is a constant, and Wi, η1,i, η2,i are independent Gaussian noises and are i.i.d. across the time index i. Here, note that WiN(0,σw2), η1,iN(0,σ12) and η2,iN(0,σ22). The secrecy capacity of the action-dependent dirty paper wiretap channel with feedback is denoted by Csagf, and the lower and upper bounds on Csagf will be given in the remainder of this section.

Figure 4.

Figure 4

The action-dependent dirty paper wiretap channel with noiseless feedback.

Before we show the bounds on Csagf, define

AN(0,PA),X=αA+γW+G,U=δX+A+βW, (26)

where α2PA+γ2σw2P, GN(0,P-α2PA-γ2σw2) and G, A, W, η1, η2 are independent of each other. Note that the definitions in Equation (26) are exactly the same as those in the action-dependent dirty paper channel [13]. Further, define

D=P-α2PA-γ2σw2, (27)
E(U2)=(1+δα)2PA+(δγ+β)2σw2+δ2D, (28)
E(Y2)=(α+1)2PA+(γ+1)2σw2+D+σ12, (29)
E(Z2)=(α+t)2PA+(γ+t)2σw2+D+σ22, (30)
E(UY)=(1+δα)(1+α)PA+(δγ+β)(1+γ)σw2+δD, (31)
E(UZ)=(1+δα)(t+α)PA+(δγ+β)(t+γ)σw2+δD, (32)
E(YZ)=(1+α)(t+α)PA+(γ+1)(γ+t)σw2+D, (33)
L=detE(U2)E(UY)E(UZ)E(UY)E(Y2)E(YZ)E(UZ)E(YZ)E(Z2). (34)

First, substituting Equations (26) and (25) into Equation (5), our new lower bound Rsagf* on Csagf is given by the following Theorem 3.

Theorem 3.

CsagfRsagf*, where

Rsagf*=maxα,γ,δ,βmin{12log(E(Y2)E(U2)E(Y2)E(U2)-(E(UY))2)-12log((γδ+β)2σw2+δ2Dδ2D),[12log(2πeE(U2))-12log(E(Z2)E(U2)E(Z2)E(U2)-(E(UZ))2)]++12log(2πeLE(Z2)E(U2)-(E(UZ))2)}, (35)

and [x]+=x for x0, else [x]+=0.

Second, substituting Equations (26) and (25) into Equation (7), the secret key based lower bound Rsagf** on Csagf is given by the following Theorem 4.

Theorem 4.

CsagfRsagf**, where

Rsagf**=maxα,γ,δ,βmin{12log(E(Y2)E(U2)E(Y2)E(U2)-(E(UY))2)-12log((γδ+β)2σw2+δ2Dδ2D),[12log(E(Y2)E(U2)E(Y2)E(U2)-(E(UY))2)-12log(E(Z2)E(U2)E(Z2)E(U2)-(E(UZ))2)]++12log(2πeLE(Z2)E(U2)-(E(UZ))2)}, (36)

and [x]+=x for x0, else [x]+=0.

Third, substituting Equations (26) and (25) into Equation (9), the upper bound Csagf-out on Csagf is given by Theorem 5.

Theorem 5.

CsagfCsagf-out, where

Csagf-out=12log(max(α,γ):α2PA+γ2σw2Pσ12+Dσ12·D+σw2(γ+1)2+σ12+PA(α+1)2D+σw2(γ+1)2+σ12). (37)

Proof. 

Here note that Equation (9) is also the capacity of the action-dependent channel with noncausal state at the transmitter, and the capacity formula of its Gaussian case is be given in [13] by substituting Equations (26) and (25) into Equation (9) and maximizing the parameters δ and β. Now, directly using the Gaussian capacity formula in [13], we have Equation (37). The proof is completed. ☐

Finally, to show the feedback gain, we also provide a lower bound Csagin on the secrecy capacity Csag of the action-dependent dirty paper wiretap channel (see Theorem 6).

Theorem 6.

CsagCsagin, where

Csagin=maxα,γ,δ,βmin{12log(E(Y2)E(U2)E(Y2)E(U2)-(E(UY))2)-12log((γδ+β)2σw2+δ2Dδ2D),12log(E(Y2)E(U2)E(Y2)E(U2)-(E(UY))2)-12log(E(Z2)E(U2)E(Z2)E(U2)-(E(UZ))2)}, (38)

Proof. 

In [20], a lower bound Csain on the secrecy capacity Csa of the discrete memoryless action-dependent wiretap channel with noncausal state at the transmitter is provided, and it is given by

Csain=maxmin{I(U;Y)-I(U;S|A),I(U;Y)-I(U;Z),H(A|Z)}. (39)

Here, note that the term H(A|Z) in Equation (39) holds due to the assumption that the action encoder is a deterministic function of the transmitted message. Specifically, once the eavesdropper obtains the action sequence AN, he knows the transmitted message, hence the achievable secrecy rate cannot exceed the eavesdropper’s uncertainty about AN, i.e., H(A|Z).

In this paper, we use a stochastic action encoder instead of the deterministic one in [20], which indicates that, even if the eavesdropper obtains AN, he does not know the transmitted message due to the randomness assumption of the action encoder. Hence. the term H(A|Z) no longer holds in this paper, i.e., for the action-dependent wiretap channel with noncausal state at the transmitter and stochastic action encoder, a lower bound Csain* is given by

Csain*=maxmin{I(U;Y)-I(U;S|A),I(U;Y)-I(U;Z)}. (40)

Finally, substituting Equations (26) and (25) into Equations (40), Equation (38) is obtained. The proof is completed. ☐

Figure 5 depicts the bounds on Csagf and the lower bound Csagin on the secrecy capacity of the action-dependent dirty paper wiretap channel for σw2=PA=1, σ12=1, σ22=0.1, t=0.9 and several values of P. For this case, we see that there is no positive achievable secrecy rate Csagin of the action-dependent dirty paper wiretap channel, and feedback enhances Csagin. Moreover, we see that the hybrid feedback scheme performs better than the secret key based feedback scheme, and there exists a gap between the lower and upper bounds on Csagf when P is sufficiently large.

Figure 5.

Figure 5

Comparison of the bounds on Csagf for PA=1, σw2=1, σ12=1, σ22=0.1, t=0.9 and P taking values in [0,5000].

Figure 6 depicts the bounds on Csagf and the lower bound Csagin on the secrecy capacity of the action-dependent dirty paper wiretap channel for σw2=PA=1, σ12=0.1, σ22=0.1, t=0.6 and P taking values in [0,0.5]. For this case, we see that feedback enhances Csagin, and the hybrid feedback scheme performs better than the secret key based feedback scheme. Moreover, we see that, when P is small, the hybrid feedback scheme is optimal, i.e., its corresponding lower bound meets the upper bound, which implies that the secrecy capacity Csagf is determined for this case. Figure 7 is an extension of Figure 6 with P taking values in [0,50]. We see that, when P is sufficiently large, there exists a gap between the lower and upper bounds on Csagf, and eliminating this gap still has a long way to go.

Figure 6.

Figure 6

Comparison of the bounds on Csagf for PA=1, σw2=1, σ12=0.1, σ22=0.1, t=0.6 and P taking values in [0,0.5].

Figure 7.

Figure 7

Comparison of the bounds on Csagf for PA=1, σw2=1, σ12=0.1, σ22=0.1, t=0.6 and P taking values in [0,50].

5. Conclusions

In this paper, we propose two achievable secrecy rates for the action-dependent wiretap channel with noncausal state at the transmitter and feedback, where one rate is achieved by using the already existing secret key based feedback strategy, and the other is achieved by using a hybrid feedback strategy. From a Gaussian example (also called the action-dependent dirty paper wiretap channel with feedback), we show that both feedback strategies proposed in this paper enhance the achievable secrecy rate of the action-dependent dirty paper wiretap channel, and the hybrid feedback strategy performs better than the secret key based feedback strategy. Moreover, we show that the hybrid feedback strategy is optimal for some special cases.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grants 61671391 and U1734209), the China Scholarship Council (file No. 201807005013), and the 111 Project No. 111-2-14.

Abbreviations

The following abbreviations are used in this manuscript:

MDPI Multidisciplinary Digital Publishing Institute
DOAJ Directory of open access journals
TLA Three letter acronym
LD linear dichroism

Author Contributions

H.Z. did the theoretical work, performed the experiments, analyzed the data and drafted the work; B.D. designed the work, performed the theoretical work, analyzed the data, interpreted the data for the work and revised the work; and L.Y. performed the theoretical work, interpreted the data for the work and revised the work. All authors approved the version to be published and agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Ahlswede R., Cai N. General Theory of Information Transfer and Combinatorics. Springer; Berlin/Heidelberg, Germany: 2006. Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder; pp. 258–275. [Google Scholar]
  • 2.Wyner A.D. The wire-tap channel. Bell Syst. Tech. J. 1975;54:1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x. [DOI] [Google Scholar]
  • 3.Ardestanizadeh E., Franceschetti M., Javidi T., Kim Y. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory. 2009;55:5353–5361. doi: 10.1109/TIT.2009.2032814. [DOI] [Google Scholar]
  • 4.Schaefer R.F., Khisti A., Poor H.V. Secure broadcasting using independent secret keys. IEEE Trans. Commun. 2018;66:644–661. doi: 10.1109/TCOMM.2017.2764892. [DOI] [Google Scholar]
  • 5.Ekrem E., Ulukus S. Secrecy capacity of a class of broadcast channels with an eavesdropper. EURASIP J. Wirel. Commun. Netw. 2009;2009:1–29. doi: 10.1155/2009/824235. [DOI] [Google Scholar]
  • 6.Cohen A., Cohen A. Wiretap channel with causal state information and secure rate-limited feedback. IEEE Trans. Commun. 2016;64:1192–1203. doi: 10.1109/TCOMM.2016.2515619. [DOI] [Google Scholar]
  • 7.Dai B., Ma Z., Luo Y. Finite state Markov wiretap channel with delayed feedback. IEEE Trans. Inf. Forensics Secur. 2017;12:746–760. doi: 10.1109/TIFS.2016.2636085. [DOI] [Google Scholar]
  • 8.Dai B., Ma Z., Xiao M., Tang X., Fan P. Secure communication over finite state multiple-access wiretap channel with delayed feedback. IEEE J. Sel. Areas Commun. 2018;36:723–736. doi: 10.1109/JSAC.2018.2824938. [DOI] [Google Scholar]
  • 9.Dai B., Luo Y. An improved feedback coding scheme for the wiretap channel. IEEE Trans. Inf. Forensics Secur. 2019;14:262–271. doi: 10.1109/TIFS.2018.2849978. [DOI] [Google Scholar]
  • 10.Kuznetsov N.V., Tsybakov B.S. Coding in memories with defective cells. Probl. Control Inf. Theory. 1974;10:52–60. [Google Scholar]
  • 11.Gel’fand S.I., Pinsker M.S. Coding for channel with random parameters. Probl. Control Inf. Theory. 1980;9:19–31. [Google Scholar]
  • 12.Costa M.H.M. Writing on dirty paper. IEEE Trans. Inf. Theory. 1983;29:439–441. doi: 10.1109/TIT.1983.1056659. [DOI] [Google Scholar]
  • 13.Weissman T. Capacity of channels with action-dependent states. IEEE Trans. Inf. Theory. 2010;56:5396–5411. doi: 10.1109/TIT.2010.2068991. [DOI] [Google Scholar]
  • 14.Chen Y., Han Vinck A.J. Wiretap channel with side information. IEEE Trans. Inf. Theory. 2008;54:395–402. doi: 10.1109/TIT.2007.911157. [DOI] [Google Scholar]
  • 15.Dai B., Luo Y. Some new results on wiretap channel with side information. Entropy. 2012;14:1671–1702. doi: 10.3390/e14091671. [DOI] [Google Scholar]
  • 16.El-Halabi M., Liu T., Georghiades C.N., Shamai S. Secret writing on dirty paper: A deterministic view. IEEE Trans. Inf. Theory. 2012;58:3419–3429. doi: 10.1109/TIT.2012.2190820. [DOI] [Google Scholar]
  • 17.Mitrpant C., Han Vinck A.J., Luo Y. An achievable region for the gaussian wiretap channel with side information. IEEE Trans. Inf. Theory. 2006;52:2181–2190. doi: 10.1109/TIT.2006.872968. [DOI] [Google Scholar]
  • 18.Leung-Yan-Cheong S.K., Hellman M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory. 1978;24:451–456. doi: 10.1109/TIT.1978.1055917. [DOI] [Google Scholar]
  • 19.Dai B., Ma Z., Fang X. Feedback enhances the security of state-dependent degraded broadcast channels with confidential messages. IEEE Trans. Inf. Forensics Secur. 2015;10:1529–1542. doi: 10.1109/TIFS.2015.2419182. [DOI] [Google Scholar]
  • 20.Dai B., Han Vinck A.J., Luo Y., Tang X. Wiretap channel with action-dependent channel state information. Entropy. 2013;15:445–473. doi: 10.3390/e15020445. [DOI] [Google Scholar]
  • 21.Dai B., Han Vinck A.J., Luo Y. Wiretap channel in the presence of action-dependent states and noiseless feedback. J. Appl. Math. 2013;2013:1–17. doi: 10.1155/2013/423619. [DOI] [Google Scholar]
  • 22.El Gamal A., Kim Y.H. Network Information Theory. Cambridge University Press; Cambridge, UK: 2011. Information measures and typicality; pp. 17–37. [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES