"The two-hop interference untrusted-relay channel with confidential messages"
Title | "The two-hop interference untrusted-relay channel with confidential messages" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | A. A. Zewail, A. Yener |
Conference Name | 2015 IEEE Information Theory Workshop - Fall (ITW) |
Date Published | Oct. 2015 |
Publisher | IEEE |
ISBN Number | 978-1-4673-7852-9 |
Accession Number | 15678935 |
Keywords | confidential messages, cooperative jamming, cryptography, Decoding, direct links, encoding, encryption block, Gaussian codewords, Gaussian processes, Interference, jamming, Lattices, message destination, message transmission, nested lattice codes, pubcrawl, radiofrequency interference, relay networks (telecommunication), Relays, scaled compute-and-forward, science of security, secure rate region, security, stochastic encoding, structured codes, telecommunication security, Trusted Computing, two hop interference untrusted relay channel, untrusted relay node, wireless channels |
Abstract | This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages. |
URL | https://ieeexplore.ieee.org/document/7360788 |
DOI | 10.1109/ITWF.2015.7360788 |
Citation Key | 7360788 |
- pubcrawl
- wireless channels
- untrusted relay node
- two hop interference untrusted relay channel
- Trusted Computing
- telecommunication security
- structured codes
- stochastic encoding
- security
- secure rate region
- scaled compute-and-forward
- Relays
- relay networks (telecommunication)
- radiofrequency interference
- Science of Security
- confidential messages
- nested lattice codes
- message transmission
- message destination
- Lattices
- Jamming
- Interference
- Gaussian processes
- Gaussian codewords
- encryption block
- encoding
- direct links
- Decoding
- Cryptography
- cooperative jamming