References & Further Reading
References
- A. D. Wyner, The Wire-Tap Channel, 1975
The foundational paper defining the wiretap channel model and establishing the secrecy capacity for the degraded case. Essential historical reading.
- I. Csiszár and J. Körner, Broadcast Channels with Confidential Messages, 1978
Extends Wyner's result to the general (non-degraded) wiretap channel and introduces the auxiliary variable formulation of the secrecy capacity. A landmark paper in information-theoretic security.
- U. M. Maurer, Secret Key Agreement by Public Discussion from Common Information, 1993
Introduces the secret key agreement model with public discussion. Shows that correlated observations can be distilled into a secret key even when the public channel is fully observable by Eve.
- R. Ahlswede and I. Csiszár, Common Randomness in Information Theory and Cryptography, Part I, 1993
Establishes the information-theoretic foundations of common randomness and secret key generation. Provides the complete characterization of secret key capacity.
- S. Goel and R. Negi, Guaranteeing Secrecy using Artificial Noise, 2008
Introduces the artificial noise technique for MIMO wiretap channels. Shows that transmitting noise in the null space of the legitimate channel provides secrecy without requiring eavesdropper CSI.
- A. Khisti and G. W. Wornell, Secure Transmission with Multiple Antennas I: The MISOME Wiretap Channel, 2010
Establishes the secrecy capacity of the MISO/MIMO wiretap channel and proves the optimality of Gaussian signaling. The companion Part II paper treats the MIMO case with multiple eavesdropper antennas.
- F. Oggier and B. Hassibi, The Secrecy Capacity of the MIMO Wiretap Channel, 2011
Complete characterization of the MIMO Gaussian wiretap channel secrecy capacity, including the non-degraded case and the role of the GSVD.
- M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering, Cambridge University Press, 2011
The most comprehensive textbook on information-theoretic security. Covers wiretap channels, key agreement, and practical implementations. Chapters 4–6 provide the theoretical backbone for this chapter.
- A. El Gamal and Y.-H. Kim, Network Information Theory, Cambridge University Press, 2011
Chapter 22 provides a rigorous treatment of secrecy in the context of network information theory, including the wiretap channel, secret key agreement, and connections to multi-terminal source/channel coding.
Further Reading
For readers who want to explore physical-layer security beyond the foundational results in this chapter.
Strong secrecy and semantic secrecy
M. Bellare, S. Tessaro, and A. Vardy, 'Semantic Security for the Wiretap Channel,' Advances in Cryptology — CRYPTO 2012, pp. 294–311
Establishes the semantic secrecy framework for the wiretap channel, showing that strong secrecy implies security for all message distributions, not just uniform. Essential for understanding the gap between information-theoretic and cryptographic security notions.
Physical-layer key generation in practice
J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, 'Key Generation from Wireless Channels: A Review,' IEEE Access, vol. 4, pp. 614–626, 2016
Comprehensive survey of practical key generation protocols, including channel probing, quantization, reconciliation, and privacy amplification. Bridges the theory of Section 20.2 to real-world implementations in Wi-Fi and LTE systems.
Massive MIMO physical-layer security
J. Zhu, R. Schober, and V. K. Bhargava, 'Secure Transmission in Multicell Massive MIMO Systems,' IEEE Trans. Wireless Commun., 2014
Extends the artificial noise technique to multi-cell massive MIMO, showing that the large antenna regime makes secrecy essentially free. Directly connects the MIMO wiretap results to 5G system design.
Intelligent reflecting surfaces for security
X. Yu, D. Xu, and R. Schober, 'MISO Wireless Communication Systems via Intelligent Reflecting Surfaces,' IEEE/KICS Journal of Comm. and Networks, 2020
Shows how IRS (intelligent reflecting surfaces) can enhance physical-layer security by creating favorable propagation for the legitimate link while degrading the eavesdropper's channel. A new dimension in the PLS toolkit.
Post-quantum cryptography and PLS
Y. Liang, H. V. Poor, and S. Shamai (Shitz), 'Information Theoretic Security,' Foundations and Trends in Communications and Information Theory, vol. 5, no. 4–5, 2009
Comprehensive survey covering the wiretap channel, broadcast channels with confidential messages, and multi-terminal secret key agreement. Provides the broader context for understanding PLS as a complement to computational security in a post-quantum world.