Visible to the public "The two-hop interference untrusted-relay channel with confidential messages"Conflict Detection Enabled

Title"The two-hop interference untrusted-relay channel with confidential messages"
Publication TypeConference Paper
Year of Publication2015
AuthorsA. A. Zewail, A. Yener
Conference Name2015 IEEE Information Theory Workshop - Fall (ITW)
Date PublishedOct. 2015
PublisherIEEE
ISBN Number978-1-4673-7852-9
Accession Number15678935
Keywordsconfidential messages, cooperative jamming, cryptography, Decoding, direct links, encoding, encryption block, Gaussian codewords, Gaussian processes, Interference, jamming, Lattices, message destination, message transmission, nested lattice codes, pubcrawl, radiofrequency interference, relay networks (telecommunication), Relays, scaled compute-and-forward, science of security, secure rate region, security, stochastic encoding, structured codes, telecommunication security, Trusted Computing, two hop interference untrusted relay channel, untrusted relay node, wireless channels
Abstract

This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable secure rate region for this network. The achievability scheme utilizes structured codes for message transmission, cooperative jamming and scaled compute-and-forward. In particular, the sources use nested lattice codes and stochastic encoding, while the destinations jam using lattice points. The relay decodes two integer combinations of the received lattice points and forwards, using Gaussian codewords, to both destinations. The achievability technique provides the insight that we can utilize the untrusted relay node as an encryption block in a two-hop interference relay channel with confidential messages.

URLhttps://ieeexplore.ieee.org/document/7360788
DOI10.1109/ITWF.2015.7360788
Citation Key7360788