Capacity-Approaching Data Transmission in MIMO Broadcast Channels —A Cross-Layer Approach
MIMO Gaussian Broadcast Channels with Common, Private …
Transcript of MIMO Gaussian Broadcast Channels with Common, Private …
![Page 1: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/1.jpg)
MIMO Gaussian Broadcast Channels withCommon, Private and Confidential Messages
Ziv Goldfeld
Ben Gurion University
IEEE Information Theory Workshop
September, 2016
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 1
![Page 2: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/2.jpg)
Motivation
Gaussian MIMO channels - model wireless communication.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 2
![Page 3: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/3.jpg)
Motivation
Gaussian MIMO channels - model wireless communication.
Susceptibility of wireless communication to eavesdropping.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 2
![Page 4: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/4.jpg)
Motivation
Gaussian MIMO channels - model wireless communication.
Susceptibility of wireless communication to eavesdropping.
Eavesdroppers are not always a malicious entity:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 2
![Page 5: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/5.jpg)
Motivation
Gaussian MIMO channels - model wireless communication.
Susceptibility of wireless communication to eavesdropping.
Eavesdroppers are not always a malicious entity:
◮ Legitimate recipient of some messages.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 2
![Page 6: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/6.jpg)
Motivation
Gaussian MIMO channels - model wireless communication.
Susceptibility of wireless communication to eavesdropping.
Eavesdroppers are not always a malicious entity:
◮ Legitimate recipient of some messages.
◮ Eavesdropper of other.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 2
![Page 7: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/7.jpg)
Motivation
Gaussian MIMO channels - model wireless communication.
Susceptibility of wireless communication to eavesdropping.
Eavesdroppers are not always a malicious entity:
◮ Legitimate recipient of some messages.
◮ Eavesdropper of other.
Modern BC scenario - Common, Private and Confidential
messages.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 2
![Page 8: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/8.jpg)
Motivation
Gaussian MIMO channels - model wireless communication.
Susceptibility of wireless communication to eavesdropping.
Eavesdroppers are not always a malicious entity:
◮ Legitimate recipient of some messages.
◮ Eavesdropper of other.
Modern BC scenario - Common, Private and Confidential
messages.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 2
![Page 9: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/9.jpg)
Motivation - Banking Site
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 3
![Page 10: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/10.jpg)
Motivation - Banking Site
Common
Common - Advertisement.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 3
![Page 11: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/11.jpg)
Motivation - Banking Site
CommonPrivate
Common - Advertisement.
Private - On-demand Public info (programs, reports, forecasts).
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 3
![Page 12: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/12.jpg)
Motivation - Banking Site
CommonPrivate
Confidential
Common - Advertisement.
Private - On-demand Public info (programs, reports, forecasts).
Confidential - Online banking (access account, transactions).Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 3
![Page 13: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/13.jpg)
MIMO Gaussian BC - Problem Setup
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 4
![Page 14: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/14.jpg)
MIMO Gaussian BC - Problem Setup
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
User j = 1,2 Observes: Yj = GjX + Zj .
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 4
![Page 15: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/15.jpg)
MIMO Gaussian BC - Problem Setup
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
User j = 1,2 Observes: Yj = GjX + Zj .
Dimensions: X, Y1, Y2, Z1, Z2 ∈ Rt ; G1, G2 ∈ R
t×t.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 4
![Page 16: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/16.jpg)
MIMO Gaussian BC - Problem Setup
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
User j = 1,2 Observes: Yj = GjX + Zj .
Dimensions: X, Y1, Y2, Z1, Z2 ∈ Rt ; G1, G2 ∈ R
t×t.
Noise Processes: i.i.d. samples of Zj ∼ N (0, It), j = 1, 2.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 4
![Page 17: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/17.jpg)
MIMO Gaussian BC - Problem Setup
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
User j = 1,2 Observes: Yj = GjX + Zj .
Dimensions: X, Y1, Y2, Z1, Z2 ∈ Rt ; G1, G2 ∈ R
t×t.
Noise Processes: i.i.d. samples of Zj ∼ N (0, It), j = 1, 2.
Input Covariance Constraint: 1n
∑ni=1 E
[
X(i)X⊤(i)]
� K.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 4
![Page 18: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/18.jpg)
MIMO Gaussian BC - Problem Setup
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
User j = 1,2 Observes: Yj = GjX + Zj .
Dimensions: X, Y1, Y2, Z1, Z2 ∈ Rt ; G1, G2 ∈ R
t×t.
Noise Processes: i.i.d. samples of Zj ∼ N (0, It), j = 1, 2.
Input Covariance Constraint: 1n
∑ni=1 E
[
X(i)X⊤(i)]
� K.
Security Criterion: 1n
I(M1; Yn2 ) −−−→
n→∞0.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 4
![Page 19: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/19.jpg)
MIMO Gaussian BC - Goals
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
Known inner and outer bounds on secrecy-capacity region.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 5
![Page 20: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/20.jpg)
MIMO Gaussian BC - Goals
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
Known inner and outer bounds on secrecy-capacity region.
Q: Do they match for the MIMO Gaussian case?
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 5
![Page 21: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/21.jpg)
MIMO Gaussian BC - Goals
X
G1
G2
Z1
Z2
Y1
Y2
(M0,M1,M2)
(
M(1)0
,M1
)
(
M(2)0
,M2
)
M1
Known inner and outer bounds on secrecy-capacity region.
Q: Do they match for the MIMO Gaussian case?
Q: Do Gaussian inputs achieve boundary points?
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 5
![Page 22: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/22.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 23: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/23.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 24: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/24.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 25: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/25.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Public Secret — Ly-Liu-Liang 2010
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 26: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/26.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Public Secret — Ly-Liu-Liang 2010
— Secret Secret Liu-Liu-Poor-Shamai 2010
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 27: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/27.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Public Secret — Ly-Liu-Liang 2010
— Secret Secret Liu-Liu-Poor-Shamai 2010
Public Secret Secret Ekrem-Ulukus 2012
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 28: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/28.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Public Secret — Ly-Liu-Liang 2010
— Secret Secret Liu-Liu-Poor-Shamai 2010
Public Secret Secret Ekrem-Ulukus 2012
— Secret Private
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 29: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/29.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Public Secret — Ly-Liu-Liang 2010
— Secret Secret Liu-Liu-Poor-Shamai 2010
Public Secret Secret Ekrem-Ulukus 2012
— Secret Private
Public Secret Private
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 30: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/30.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Public Secret — Ly-Liu-Liang 2010
— Secret Secret Liu-Liu-Poor-Shamai 2010
Public Secret Secret Ekrem-Ulukus 2012
— Secret Private This work
Public Secret Private This work
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 31: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/31.jpg)
MIMO Gaussian BC - Some Literature
MIMO Gaussian BCs with Eavesdropping Receivers:
M0 M1 M2 Solution
— Private Private Weingarten-Steinberg-Shamai 2006
Public Private Private Geng-Nair 2014
Public Secret — Ly-Liu-Liang 2010
— Secret Secret Liu-Liu-Poor-Shamai 2010
Public Secret Secret Ekrem-Ulukus 2012
— Secret Private This work
Public Secret Private This work
⋆ Solution for two last unsolved cases via Upper Concave Envelopes ⋆
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 6
![Page 32: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/32.jpg)
MIMO Gaussian BC - Secrecy-Capacity ResultsWithout a Common Message: M1 - Confidential ; M2 - Private
Theorem (ZG 2016)
The secrecy-capacity region for a covariance constraint K � 0 is
CK =⋃
0�K⋆�K
(R1, R2) ∈ R2+
∣
∣
∣
∣
∣
∣
∣
∣
∣
∣
∣
R1 ≤ 12 log
∣
∣
∣
∣
∣
I + G1K⋆G⊤1
I + G2K⋆G⊤2
∣
∣
∣
∣
∣
R2 ≤ 12 log
∣
∣
∣
∣
∣
I + G2KG⊤2
I + G2K⋆G⊤2
∣
∣
∣
∣
∣
.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 7
![Page 33: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/33.jpg)
MIMO Gaussian BC - Secrecy-Capacity ResultsWithout a Common Message: M1 - Confidential ; M2 - Private
Theorem (ZG 2016)
The secrecy-capacity region for a covariance constraint K � 0 is
CK =⋃
0�K⋆�K
(R1, R2) ∈ R2+
∣
∣
∣
∣
∣
∣
∣
∣
∣
∣
∣
R1 ≤ 12
log
∣
∣
∣
∣
∣
I + G1K⋆G⊤1
I + G2K⋆G⊤2
∣
∣
∣
∣
∣
R2 ≤ 12 log
∣
∣
∣
∣
∣
I + G2KG⊤2
I + G2K⋆G⊤2
∣
∣
∣
∣
∣
.
R1 Bound - MIMO Gaussian WTC Secrecy-capacity:User 1 - Legitimate with input covariance K⋆ ; User 2- Eavesdropper.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 7
![Page 34: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/34.jpg)
MIMO Gaussian BC - Secrecy-Capacity ResultsWithout a Common Message: M1 - Confidential ; M2 - Private
Theorem (ZG 2016)
The secrecy-capacity region for a covariance constraint K � 0 is
CK =⋃
0�K⋆�K
(R1, R2) ∈ R2+
∣
∣
∣
∣
∣
∣
∣
∣
∣
∣
∣
R1 ≤ 12 log
∣
∣
∣
∣
∣
I + G1K⋆G⊤1
I + G2K⋆G⊤2
∣
∣
∣
∣
∣
R2 ≤ 12
log
∣
∣
∣
∣
∣
I + G2KG⊤2
I + G2K⋆G⊤2
∣
∣
∣
∣
∣
.
R1 Bound - MIMO Gaussian WTC Secrecy-capacity:User 1 - Legitimate with input covariance K⋆ ; User 2- Eavesdropper.
R2 Bound - Capacity of MIMO Gaussian PTP to User 2:Input covariance K − K⋆ ; Noise covariance I + G2K⋆G⊤
2 .
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 7
![Page 35: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/35.jpg)
MIMO Gaussian BC - Secrecy-Capacity ResultsM0 - Common ; M1 - Confidential ; M2 - Private
Theorem (ZG 2016)
The secrecy-capacity region for a covariance constraint K � 0 is
CK =⋃
0�K1,K2:
K1+K2�K
R0 ≤ minj=1,2
{
12 log
∣
∣
∣
∣
∣
I + GjKG⊤j
I + Gj(K1 + K2)G⊤j
∣
∣
∣
∣
∣
}
R1 ≤ 12 log
∣
∣
∣
∣
∣
I + G1K1G⊤1
I + G2K1G⊤2
∣
∣
∣
∣
∣
R2 ≤ 12 log
∣
∣
∣
∣
∣
I + G2(K1 + K2)G⊤2
I + G2K1G⊤2
∣
∣
∣
∣
∣
.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 8
![Page 36: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/36.jpg)
MIMO Gaussian BC - Secrecy-Capacity ResultsM0 - Common ; M1 - Confidential ; M2 - Private
Theorem (ZG 2016)
The secrecy-capacity region for a covariance constraint K � 0 is
CK =⋃
0�K1,K2:
K1+K2�K
R0 ≤ minj=1,2
{
12 log
∣
∣
∣
∣
∣
I + GjKG⊤j
I + Gj(K1 + K2)G⊤j
∣
∣
∣
∣
∣
}
R1 ≤ 12
log
∣
∣
∣
∣
∣
I + G1K1G⊤1
I + G2K1G⊤2
∣
∣
∣
∣
∣
R2 ≤ 12 log
∣
∣
∣
∣
∣
I + G2(K1 + K2)G⊤2
I + G2K1G⊤2
∣
∣
∣
∣
∣
.
R1 Bound: MIMO Gaussian WTC with input K1
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 8
![Page 37: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/37.jpg)
MIMO Gaussian BC - Secrecy-Capacity ResultsM0 - Common ; M1 - Confidential ; M2 - Private
Theorem (ZG 2016)
The secrecy-capacity region for a covariance constraint K � 0 is
CK =⋃
0�K1,K2:
K1+K2�K
R0 ≤ minj=1,2
{
12 log
∣
∣
∣
∣
∣
I + GjKG⊤j
I + Gj(K1 + K2)G⊤j
∣
∣
∣
∣
∣
}
R1 ≤ 12 log
∣
∣
∣
∣
∣
I + G1K1G⊤1
I + G2K1G⊤2
∣
∣
∣
∣
∣
R2 ≤ 12
log
∣
∣
∣
∣
∣
I + G2(K1 + K2)G⊤2
I + G2K1G⊤2
∣
∣
∣
∣
∣
.
R1 Bound: MIMO Gaussian WTC with input K1
R2 Bound: MIMO Gaussian PTP with input K2 (K1 is noise).
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 8
![Page 38: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/38.jpg)
MIMO Gaussian BC - Secrecy-Capacity ResultsM0 - Common ; M1 - Confidential ; M2 - Private
Theorem (ZG 2016)
The secrecy-capacity region for a covariance constraint K � 0 is
CK =⋃
0�K1,K2:
K1+K2�K
R0 ≤ minj=1,2
{
12
log
∣
∣
∣
∣
∣
I + GjKG⊤j
I + Gj(K1 + K2)G⊤j
∣
∣
∣
∣
∣
}
R1 ≤ 12 log
∣
∣
∣
∣
∣
I + G1K1G⊤1
I + G2K1G⊤2
∣
∣
∣
∣
∣
R2 ≤ 12 log
∣
∣
∣
∣
∣
I + G2(K1 + K2)G⊤2
I + G2K1G⊤2
∣
∣
∣
∣
∣
.
R1 Bound: MIMO Gaussian WTC with input K1
R2 Bound: MIMO Gaussian PTP with input K2 (K1 is noise).R0 Bound: MIMO Gaussian PTP with remaining covarianceK − (K1 + K2) (K1,K2 are noises).
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 8
![Page 39: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/39.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 40: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/40.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 41: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/41.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016]
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 42: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/42.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016] =⇒ IK ⊆ CK ⊆ OK
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 43: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/43.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016] =⇒ IK ⊆ CK ⊆ OK
2 OK bounded & convex
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 44: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/44.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016] =⇒ IK ⊆ CK ⊆ OK
2 OK bounded & convex =⇒ Supporting hyperplanesmax
(R1,R2)∈OK
λ1R1 + λ2R2
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 45: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/45.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016] =⇒ IK ⊆ CK ⊆ OK
2 OK bounded & convex =⇒ Supporting hyperplanesmax
(R1,R2)∈OK
λ1R1 + λ2R2
3 max(R1,R2)∈OK
λ1R1 + λ2R2
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 46: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/46.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016] =⇒ IK ⊆ CK ⊆ OK
2 OK bounded & convex =⇒ Supporting hyperplanesmax
(R1,R2)∈OK
λ1R1 + λ2R2
3 max(R1,R2)∈OK
λ1R1 + λ2R2 ≤ Upper Concave Envelope
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 47: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/47.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016] =⇒ IK ⊆ CK ⊆ OK
2 OK bounded & convex =⇒ Supporting hyperplanesmax
(R1,R2)∈OK
λ1R1 + λ2R2
3 max(R1,R2)∈OK
λ1R1 + λ2R2 ≤ Upper Concave Envelope
4 UCE maximized by Gaussian inputs
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 48: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/48.jpg)
Secrecy-Capacity without M0 - Proof Outline
Outer Bound: Fix a covariance constraint K� 0.
1 [ZG-Kramer-Permuter 2016] =⇒ IK ⊆ CK ⊆ OK
2 OK bounded & convex =⇒ Supporting hyperplanesmax
(R1,R2)∈OK
λ1R1 + λ2R2
3 max(R1,R2)∈OK
λ1R1 + λ2R2 ≤ Upper Concave Envelope
4 UCE maximized by Gaussian inputs
=⇒ OK ⊆ Region from Theorem
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 9
![Page 49: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/49.jpg)
Secrecy-Capacity without M0 - Proof Outline
Achievability:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 10
![Page 50: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/50.jpg)
Secrecy-Capacity without M0 - Proof Outline
Achievability: Substituting Gaussian inputs into IK.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 10
![Page 51: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/51.jpg)
Secrecy-Capacity without M0 - Proof Outline
Achievability: Substituting Gaussian inputs into IK.
Dirty Paper Coding to cancel M2 signal at Receiver 1.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 10
![Page 52: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/52.jpg)
Secrecy-Capacity without M0 - Proof Outline
Achievability: Substituting Gaussian inputs into IK.
Dirty Paper Coding to cancel M2 signal at Receiver 1.
⋆ Other variant of DPC (cancel M1 at Rec. 2) not necessary.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 10
![Page 53: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/53.jpg)
Secrecy-Capacity without M0 - Proof Outline
Achievability: Substituting Gaussian inputs into IK.
Dirty Paper Coding to cancel M2 signal at Receiver 1.
⋆ Other variant of DPC (cancel M1 at Rec. 2) not necessary.
⇓
Region from Theorem ⊆ IK
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 10
![Page 54: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/54.jpg)
Secrecy-Capacity without M0 - Proof Outline
Achievability: Substituting Gaussian inputs into IK.
Dirty Paper Coding to cancel M2 signal at Receiver 1.
⋆ Other variant of DPC (cancel M1 at Rec. 2) not necessary.
⇓
OK ⊆ Region from Theorem ⊆ IK
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 10
![Page 55: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/55.jpg)
Secrecy-Capacity without M0 - Proof Outline
Achievability: Substituting Gaussian inputs into IK.
Dirty Paper Coding to cancel M2 signal at Receiver 1.
⋆ Other variant of DPC (cancel M1 at Rec. 2) not necessary.
⇓
OK ⊆ Region from Theorem ⊆ IK
⇓
OK = Region from Theorem = IK
�
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 10
![Page 56: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/56.jpg)
Secrecy-Capacity without M0 - Visualization
Secrecy-Capacity Region under Average Power Constraint:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 11
![Page 57: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/57.jpg)
Secrecy-Capacity without M0 - Visualization
Secrecy-Capacity Region under Average Power Constraint:
Corollary:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 11
![Page 58: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/58.jpg)
Secrecy-Capacity without M0 - Visualization
Secrecy-Capacity Region under Average Power Constraint:
Corollary: 1n
n∑
i=1E
[
∣
∣
∣
∣X(i)∣
∣
∣
∣
2]
≤ P
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 11
![Page 59: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/59.jpg)
Secrecy-Capacity without M0 - Visualization
Secrecy-Capacity Region under Average Power Constraint:
Corollary: 1n
n∑
i=1E
[
∣
∣
∣
∣X(i)∣
∣
∣
∣
2]
≤ P =⇒ CP =⋃
0�K:Tr(K)≤P
CK
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 11
![Page 60: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/60.jpg)
Secrecy-Capacity without M0 - Visualization
Secrecy-Capacity Region under Average Power Constraint:
Corollary: 1n
n∑
i=1E
[
∣
∣
∣
∣X(i)∣
∣
∣
∣
2]
≤ P =⇒ CP =⋃
0�K:Tr(K)≤P
CK
0.6 0.8 10.2 0.4
1
2
3
4
5
0
0
M1 Confidential
Both Confidential
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 11
![Page 61: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/61.jpg)
Summary
MIMO Gaussian BC - Common, Private and Conf. Messages:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 12
![Page 62: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/62.jpg)
Summary
MIMO Gaussian BC - Common, Private and Conf. Messages:
◮ Practical: Natural broadcasting scenario.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 12
![Page 63: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/63.jpg)
Summary
MIMO Gaussian BC - Common, Private and Conf. Messages:
◮ Practical: Natural broadcasting scenario.
◮ Theoretical: Last two unsolved cases.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 12
![Page 64: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/64.jpg)
Summary
MIMO Gaussian BC - Common, Private and Conf. Messages:
◮ Practical: Natural broadcasting scenario.
◮ Theoretical: Last two unsolved cases.
Secrecy-Sapacity Results:
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 12
![Page 65: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/65.jpg)
Summary
MIMO Gaussian BC - Common, Private and Conf. Messages:
◮ Practical: Natural broadcasting scenario.
◮ Theoretical: Last two unsolved cases.
Secrecy-Sapacity Results:
◮ Characterization & Optimality of Gaussian inputs.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 12
![Page 66: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/66.jpg)
Summary
MIMO Gaussian BC - Common, Private and Conf. Messages:
◮ Practical: Natural broadcasting scenario.
◮ Theoretical: Last two unsolved cases.
Secrecy-Sapacity Results:
◮ Characterization & Optimality of Gaussian inputs.
◮ Proof via Upper Concave Envelopes & Dirty-Paper Coding.
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 12
![Page 67: MIMO Gaussian Broadcast Channels with Common, Private …](https://reader031.fdocuments.in/reader031/viewer/2022012512/618a99e3a82516799b31fe4d/html5/thumbnails/67.jpg)
Summary
MIMO Gaussian BC - Common, Private and Conf. Messages:
◮ Practical: Natural broadcasting scenario.
◮ Theoretical: Last two unsolved cases.
Secrecy-Sapacity Results:
◮ Characterization & Optimality of Gaussian inputs.
◮ Proof via Upper Concave Envelopes & Dirty-Paper Coding.
Thank You!
Z. Goldfeld Ben Gurion University
MIMO Gaussian BCs with Common, Private and Confidential Messages 12