Prerequisites & Notation
Before You Begin
This chapter introduces information-theoretic secrecy, which requires a solid background in channel coding and multiuser information theory.
- Channel capacity and the channel coding theorem(Review ch09)
Self-check: Can you state the channel coding theorem and sketch the random coding achievability proof?
- The Gaussian channel and its capacity(Review ch10)
Self-check: Can you derive and explain why Gaussian input is optimal?
- Random binning and Slepian–Wolf coding(Review ch07)
Self-check: Can you explain how random binning assigns multiple source sequences to the same index?
- The broadcast channel and superposition coding(Review ch15)
Self-check: Can you describe superposition coding for the degraded BC and state its capacity region?
- Mutual information and the data processing inequality(Review ch01)
Self-check: Can you prove the data processing inequality from the chain rule of mutual information?
- MIMO channel model and capacity
Self-check: Can you write the MIMO channel capacity formula ?
Notation for This Chapter
Symbols introduced or heavily used in this chapter.
| Symbol | Meaning | Introduced |
|---|---|---|
| Secrecy capacity (bits per channel use) | s01 | |
| Eavesdropper's observation (or eavesdropper's channel output) | s01 | |
| Legitimate receiver's channel output | s01 | |
| Equivocation rate at the eavesdropper | s01 | |
| Information leakage to the eavesdropper | s01 | |
| Secret key capacity | s02 | |
| Eavesdropper's channel matrix (MIMO wiretap) | s03 | |
| Input covariance matrix | s03 | |
| Artificial noise beamforming direction | s03 |