In this paper, the role of secret key with finite rate is studied to enhance the secrecy performance of the system when users are operating in interference limited scenarios. To address this problem, a 2-user Gaussian Z-IC with secrecy constraint at the receiver is considered. One of the fundamental problems here is how to use the secret key as a part of the encoding process. The paper proposes novel achievable schemes, where the schemes differ from each other based on how the key has been used in the encoding process. The first achievable scheme uses one part of the key for one-time pad and remaining part of the key for wiretap coding. The encoding is performed such that the receiver experiencing interference can decode some part of the interference without violating the secrecy constraint. As a special case of the derived result, one can obtain the secrecy rate region when the key is completely used for one-time pad or part of the wiretap coding. The second scheme uses the shared key to encrypt the message using one-time pad and in contrast to the previous case no interference is decoded at the receiver. The paper also derives an outer bound on the sum rate and secrecy rate of the transmitter which causes interference. The main novelty of deriving outer bound lies in the selection of side information provided to the receiver and using the secrecy constraint at the receiver. The derived outer bounds are found to be tight depending on the channel conditions and rate of the key. The scaling behaviour of key rate is also explored for different schemes using the notion of secure GDOF. The optimality of different schemes is characterized for some specific cases. The developed results show the importance of key rate splitting in enhancing the secrecy performance of the system when users are operating under interference limited environment.
翻译:在本文中, 秘密密钥的作用与限制费率的作用, 是为了在用户在干扰有限的情况下操作时提高系统保密性能。 为了解决这个问题, 考虑了2个用户 Gaussian Z- IC 在接收器的保密限制下使用2个用户 Gaussian Z- IC 。 这里的一个基本问题是如何使用秘密密钥作为编码过程的一部分。 本文提出了新的可实现计划, 因为在编码过程中, 密钥的使用方式不同。 第一个可实现计划使用一次性密钥的一部分, 而在监听器的密钥中则使用一次性密钥, 其余部分则使用监听器编码。 进行编码的编码是为了让正在经历干扰的接收器解码部分。 正在经历最佳干涉的2个用户可以解码部分干扰。 作为衍生结果的一个特例, 当该密钥完全用于一次性垫或部分编译编码程序时, 可以获取保密区域区域。 第二种办法使用共享密钥对信息进行加密, 而与前一例相比, 没有干扰。 在接收器中, 也通过外部分解的严格规则, 将精度的精度的精度的精度的精度, 在选择中, 缩缩缩缩操作中, 显示导率的精度运行的精度运行中, 的精度的精度的精度显示的精度, 的精度的精度运行的精度显示的精度运行的精度运行的精度运行的精度, 。 在导率的精度, 的精度运行率的精度运行。