#### DMCA

## Secure degrees of freedom of the interference channel with no eavesdropper CSI (2015)

Venue: | in IEEE Inf. Theory Workshop |

Citations: | 1 - 0 self |

### Citations

419 | Interference Alignment and Degrees of Freedom of the K-User Interference Channel
- Cadambe, Jafar
- 2008
(Show Context)
Citation Context ...open problem. In the absence of exact capacity regions, the degrees of freedom (d.o.f.) of the interference channel at high signal-to-noise (SNR) regimes has been studied in the literature. Reference =-=[1]-=- establishes the optimal sum d.o.f. of the K-user interference channel without any security constraints to be K2 . With an external eavesdropper whose CSIT is available, references [2], [3] determine ... |

292 | Wireless network information flow: A deterministic approach - Avestimehr, Diggavi, et al. - 2011 |

89 | Real interference alignment: Exploiting the potential of single antenna systems,” Submitted to
- Motahari, Gharan, et al.
- 2009
(Show Context)
Citation Context ...n no eavesdropper’s CSIT is available and establish the optimal sum s.d.o.f. to be K−12 in this case. To that end, we provide an achievable scheme based on asymptotic real interference alignment [4], =-=[5]-=-. We consider the case of fixed channel gains in this paper. Our work can be extended to the case of fading channel gains using a scheme based on vector space alignment [1], that achieves the same opt... |

45 | Real interference alignment with real numbers,” Submitted to - Motahari, Gharan, et al. - 2009 |

41 | Interference alignment for secrecy
- Koyluoglu, Gamal, et al.
- 2008
(Show Context)
Citation Context ...his insight along with the techniques of [3], we establish the optimal sum s.d.o.f. to be K−12 for our model. Related work: The K-user interference channel with an external eavesdropper is studied in =-=[8]-=-. When the eavesdropper’s CSIT is available, [8] proposes a scheme that achieves sum s.d.o.f. of K−12 . The optimal s.d.o.f. in this case, however, is established in [3] to be K(K−1)2K−1 , using coope... |

22 | Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming,” CISS
- Xie, Ulukus
- 2013
(Show Context)
Citation Context ...the optimal s.d.o.f. to be K−12 . The impact of no eavesdropper CSIT has been investigated for other channel models as well. For the wiretap channel with K helpers and no eavesdropper CSIT, reference =-=[9]-=- shows that the optimal s.d.o.f. is KK+1 , which coincides with the optimal s.d.o.f. with full eavesdropper’s CSIT [10]. Thus, there is no loss of s.d.o.f. in this case due to unavailability of the ea... |

19 | Secure degrees of freedom of one-hop wireless networks
- Xie, Ulukus
(Show Context)
Citation Context ... well. For the wiretap channel with K helpers and no eavesdropper CSIT, reference [9] shows that the optimal s.d.o.f. is KK+1 , which coincides with the optimal s.d.o.f. with full eavesdropper’s CSIT =-=[10]-=-. Thus, there is no loss of s.d.o.f. in this case due to unavailability of the eavesdropper’s CSIT. For the K-user multiple access wiretap channel, reference [11] shows that when the eavesdropper’s CS... |

10 | Unified Secure DoF Analysis of K-User Gaussian Interference Channels
- Xie, Ulukus
- 2013
(Show Context)
Citation Context ...ture. Reference [1] establishes the optimal sum d.o.f. of the K-user interference channel without any security constraints to be K2 . With an external eavesdropper whose CSIT is available, references =-=[2]-=-, [3] determine the optimal sum secure degrees of freedom (s.d.o.f.) of the K-user interference channel to be K(K−1)2K−1 . In this paper, we focus on the case when no eavesdropper’s CSIT is available ... |

8 | Aligned image sets under channel uncertainty: Settling a conjecture by lapidoth, shamai and wigger on the collapse of degrees of freedom under finite precision csit,” arXiv preprint arXiv:1403.1541
- Davoodi, Jafar
(Show Context)
Citation Context ...mal sum s.d.o.f. for the K-user interference channel with both confidential messages and an external eavesdropper, with no eavesdropper CSIT. To prove the converse, we combine techniques from [3] and =-=[7]-=-. We exploit a key result in [7] that the output entropy at a receiver whose CSIT is not available is at least as large as the output entropy at a receiver whose CSIT is available, even when the trans... |

5 | Secure degrees of freedom of K-user Gaussian interference channels: A unified view. Submitted to
- Xie, Ulukus
- 2013
(Show Context)
Citation Context ... Reference [1] establishes the optimal sum d.o.f. of the K-user interference channel without any security constraints to be K2 . With an external eavesdropper whose CSIT is available, references [2], =-=[3]-=- determine the optimal sum secure degrees of freedom (s.d.o.f.) of the K-user interference channel to be K(K−1)2K−1 . In this paper, we focus on the case when no eavesdropper’s CSIT is available and e... |

2 | Secure degrees of freedom of the multiple access wiretap channel with no eavesdropper CSI,’’ presented at the
- Mukherjee, Ulukus
- 2015
(Show Context)
Citation Context ....d.o.f. with full eavesdropper’s CSIT [10]. Thus, there is no loss of s.d.o.f. in this case due to unavailability of the eavesdropper’s CSIT. For the K-user multiple access wiretap channel, reference =-=[11]-=- shows that when the eavesdropper’s CSIT is not available, the optimal sum s.d.o.f. decreases from K(K−1) K(K−1)+1 [10] to K−1 K , and the K-user multiple access wiretap channel reduces to a wiretap c... |

1 | Secure degrees of freedom of one-hop wireless networks with no eavesdropper CSIT
- Mukherjee, Xie, et al.
- 2015
(Show Context)
Citation Context ...ded to the case of fading channel gains using a scheme based on vector space alignment [1], that achieves the same optimal sum s.d.o.f. of K−12 ; we omit the scheme here due to space constraints, see =-=[6]-=-. An interesting aspect of our proposed scheme is that it provides confidentiality of the messages This work was supported by NSF Grants CNS 13-14733, CCF 14-22111 and CCF 14-22129. X1 X2 XK W1 W2 WK ... |