Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 63 tok/s
Gemini 2.5 Pro 49 tok/s Pro
GPT-5 Medium 14 tok/s Pro
GPT-5 High 19 tok/s Pro
GPT-4o 100 tok/s Pro
Kimi K2 174 tok/s Pro
GPT OSS 120B 472 tok/s Pro
Claude Sonnet 4 37 tok/s Pro
2000 character limit reached

On The Fast Fading Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages and Partial CSIT (1307.2430v1)

Published 9 Jul 2013 in cs.IT and math.IT

Abstract: In wiretap channels the eavesdropper's channel state information (CSI) is commonly assumed to be known at transmitter, fully or partially. However, under perfect secrecy constraint the eavesdropper may not be motivated to feedback any correct CSI. In this paper we consider a more feasible problem for the transmitter to have eavesdropper's CSI. That is, the fast fading multiple-antenna Gaussian broadcast channels (FMGBC-CM) with confidential messages, where both receivers are legitimate users such that they both are willing to feedback accurate CSI to maintain their secure transmission, and not to be eavesdropped by the other. We assume that only the statistics of the channel state information are known by the transmitter. We first show the necessary condition for the FMGBC-CM not to be degraded to the common wiretap channels. Then we derive the achievable rate region for the FMGBC-CM where the channel input covariance matrices and the inflation factor are left unknown and to be solved. After that we provide an analytical solution to the channel input covariance matrices. We also propose an iterative algorithm to solve the channel input covariance matrices and the inflation factor. Due to the complicated rate region formulae in normal SNR, we resort to low SNR analysis to investigate the characteristics of the channel. Finally, numerical examples show that under perfect secrecy constraint both users can achieve positive rates simultaneously, which verifies our derived necessary condition. Numerical results also elucidate the effectiveness of the analytic solution and proposed algorithm of solving the channel input covariance matrices and the inflation factor under different conditions.

Citations (1)
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.