4.5 Article

Quadratically Constrained Myopic Adversarial Channels

期刊

IEEE TRANSACTIONS ON INFORMATION THEORY
卷 68, 期 8, 页码 4901-4948

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIT.2022.3167554

关键词

Channel coding; communication channels; channel capacity; channel state information; Gaussian channels

资金

  1. University Grants Committee of the Hong Kong Special Administrative Region [AoE/E-02/08]
  2. General Research Fund (GRF), Research Grants Council (RGC) [14208315, 14313116]
  3. European Union [682203-ERC-[Inf-Speed-Tradeoff]]
  4. Chinese University of Hong Kong (CUHK) [4055039, 4055077]
  5. U.S. National Science Foundation [CCF-1909468]

向作者/读者索取更多资源

In this study, we investigate communication in the presence of a jamming adversary with quadratic power constraints on the transmitter and the jammer. We characterize the capacity of this channel under different noise-to-signal ratios (NSRs) and discuss the assumption of common randomness between the encoder and decoder. Our proof techniques involve a myopic list-decoding result and a Plotkin-type push attack.
We study communication in the presence of a jamming adversary where quadratic power constraints are imposed on the transmitter and the jammer. The jamming signal is allowed to be a function of the codebook, and a noncausal but noisy observation of the transmitted codeword. For a certain range of the noise-to-signal ratios (NSRs) of the transmitter and the jammer, we are able to characterize the capacity of this channel under deterministic encoding or stochastic encoding, i.e., with no common randomness between the encoder/decoder pair. For the remaining NSR regimes, we determine the capacity under the assumption of a small amount of common randomness (at most 2 log (n) bits in one sub-regime, and at most Omega(n) bits in the other sub-regime) available to the encoder-decoder pair. Our proof techniques involve a novel myopic list-decoding result for achievability, and a Plotkin-type push attack for the converse in a subregion of the NSRs, both of which may be of independent interest. We also give bounds on the strong secrecy capacity of this channel assuming that the jammer is simultaneously eavesdropping.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据