Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published February 2018 | public
Journal Article

The MIMO Wiretap Channel Decomposed

Abstract

The problem of sending a secret message over the Gaussian multiple-input multiple-output (MIMO) wiretap channel is studied. While the capacity of this channel is known, it is not clear how to construct optimal coding schemes that achieve this capacity. In this work, we use linear operations along with successive interference cancellation to attain effective parallel single-antenna wiretap channels. By using independent scalar Gaussian wiretap codebooks over the resulting parallel channels, the capacity of the MIMO wiretap channel is achieved. The derivation of the schemes is based upon joint triangularization of the channel matrices.We find that the same technique can be used to re-derive capacity expressions for the MIMO wiretap channel in a way that is simple and closely connected to a transmission scheme. This technique allows to extend the previously proven strong security for scalar Gaussian channels to the MIMO case. We further consider the problem of transmitting confidential messages over a two-user broadcast MIMO channel. For that problem, we find that derivation of both the capacity and a transmission scheme is a direct corollary of the proposed analysis for the MIMO wiretap channel.

Additional Information

© 2017 IEEE. Manuscript received August 18, 2015; revised October 25, 2016; accepted February 17, 2017. Date of publication June 1, 2017; date of current version January 18, 2018. A. Khina was supported in part by the Feder Family Award, in part by the Yitzhak and Chaya Weinstein Research Institute for Signal Processing, and in part by the Clore Israel Foundation. Y. Kochman was supported in part by the Israeli Science Foundation under Grant 956/12, in part by the German–Israeli Foundation for Scientific Research and Development, and in part by the HUJI Cyber Security Research Center in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office. A. Khisti was supported by QNRF, a member of Qatar Foundation, through the NPRP Project under Grant 5-603-2-243. This paper was presented in part at the 2014 IEEE International Symposium of Information Theory (ISIT) and at the 2015 IEEE ISIT.

Additional details

Created:
August 19, 2023
Modified:
October 25, 2023