Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01-12-2009 | Research Article

Secret Sharing over Fast-Fading MIMO Wiretap Channels

Authors: Tan F. Wong, Matthieu Bloch, John M. Shea

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2009

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different from but correlated to those made by the destination. An interactive, authenticated public channel with unlimited capacity is available to the source and destination for the secret sharing process. This situation is a special case of the "channel model with wiretapper" considered by Ahlswede and Csiszár. An extension of their result to continuous channel alphabets is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and eavesdropper are then investigated.

1. Introduction

The wiretap channel considered in the seminal paper [1] is the first example that demonstrates the possibility of secure communications at the physical layer. It is shown in [1] that a source can transmit a message at a positive (secrecy) rate to a destination in such a way that an eavesdropper only gathers information at a negligible rate, when the source-to-eavesdropper channel is a degraded version of the source-to-destination channel, the source-to-eavesdropper and source-to-destination channels will hereafter be referred to as eavesdropper and destination channels, respectively. A similar result for the Gaussian wiretap channel is provided in [2]. The work in [3] further removes the degraded wiretap channel restriction showing that positive secrecy capacity is possible if the destination channel is "more capable" ("less noisy" for a full extension of the rate region in [1]) than the eavesdropper's channel. Recently, there has been a flurry of interest in extending these early results to more sophisticated channel models, including fading wiretap channels, multiinput multi-output (MIMO) wiretap channels, multiple-access wiretap channels, broadcast wiretap channels, and relay wiretap channels. We do not attempt to provide a comprehensive summary of all recent developments but highlight only those results that are most relevant to the present work. We refer interested readers to the introduction and reference list of [4] for a concise and extensive overview of recent works.
When the destination and eavesdropper channels experience independent fading, the strict requirement of having a more capable destination channel for positive secrecy capacity can be loosened. This is due to the simple observation that the destination channel may be more capable than the eavesdropper's channel under some fading realizations, even if the destination is not more capable than the eavesdropper on average. Hence, if the channel state information (CSI) of both the destination and eavesdropper channels is available at the source, it is shown in [4, 5] that a positive secrecy capacity can be achieved by means of appropriate power control at the source. The key idea is to opportunistically transmit only during those fading realizations for which the destination channel is more capable [6]. For block-ergodic fading, it is also shown in [5] (see also [7]) that a positive secrecy capacity can be achieved with a variable-rate transmission scheme without any eavesdropper CSI available at the source.
When the source, destination, and eavesdropper have multiple antennas, the resulting channel is known as a MIMO wiretap channel (see [812]), which may also have positive secrecy capacity. Since the MIMO wiretap channel is not degraded, the characterization of its secrecy capacity is not straightforward. For instance, the secrecy capacity of the MIMO wiretap channel is characterized in [9] as the saddle point of a minimax problem, while an alternative characterization based on a recent result for multiantenna broadcast channels is provided in [11]. Interestingly all characterizations point to the fact that the capacity achieving scheme is one that transmits only in the directions in which the destination channel is more capable than the eavesdropper's channel. Obviously, this is only possible when the destination and eavesdropper CSI is available at the source. It is shown in [9] that if the individual channels from antennas to antennas suffer from independent Rayleigh fading, and the respective ratios of the numbers of source and destination antennas to that of eavesdropper antennas are larger than certain fixed values, then the secrecy capacity is positive with probability one when the numbers of source, destination, and eavesdropper antennas become very large.
As discussed above, the availability of destination (and eavesdropper) CSI at the source is an implicit requirement for positive secrecy capacity in the fading and MIMO wiretap channels. Thus, an authenticated feedback channel is needed to send the CSI from the destination back to the source. In [5, 7], this feedback channel is assumed to be public, and hence the destination CSI is also available to the eavesdropper. In addition, it is assumed that the eavesdropper knows its own CSI. With the availability of a feedback channel, if the objective of having the source send secret information to the destination is relaxed to distilling a secret key shared between the source and destination, it is shown in [13] that a positive key rate is achievable when the destination and eavesdropper channels are two conditionally independent (given the source input symbols) memoryless binary channels, even if the destination channel is not more capable than the eavesdropper's channel. This notion of secret sharing is formalized in [14] based on the concept of common randomness between the source and destination. Assuming the availability of an interactive, authenticated public channel with unlimited capacity between the source and destination [14] suggests two different system models, called the "source model with wiretapper" (SW) and the "channel model with wiretapper" (CW). The CW model is similar to the (discrete memoryless) wiretap channel model that we have discussed before. The SW model differs in that the random symbols observed at the source, destination, and eavesdropper are realizations of a discrete memoryless source with multiple components. Both SW and CW models have been extended to the case of secret sharing among multiple terminals, with the possibility of some terminals acting as helpers [1517]. Key capacities have been obtained for the two special cases in which the eavesdropper's channel is a degraded version of the destination channel and in which the destination and eavesdropper channels are conditionally independent [13, 14]. Similar results have been derived for multiterminal secret sharing [16, 17], with the two special cases above subsumed by the more general condition that the terminal symbols form a Markov chain on a tree. Authentication of the public channel can be achieved by the use of an initial short key and then a small portion of the subsequent shared secret message [18]. A detailed study of secret sharing over an unauthenticated public channel is given in [1921].
Other approaches to employ feedback have also been recently considered [2224]. In particular, it is shown in [22] that positive secrecy capacity can be achieved for the modulo-additive discrete memoryless wiretap channel and the modulo- https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq1_HTML.gif channel if the destination is allowed to send signals back to the source over the same wiretap channel and both terminals can operate in full-duplex manner. In fact, for the former channel, the secrecy capacity is the same as the capacity of such a channel in the absence of the eavesdropper.
In this paper, we consider secret sharing over a fast-fading MIMO wiretap channel. Thus, we are interested in the CW model of [14] with memoryless conditionally independent destination and eavesdropper channels and continuous channel alphabets. We provide an extension of the key capacity result in [14] for this case to include continuous channel alphabets (Theorem 1). Using this result, we obtain the key capacity of the fast-fading MIMO wiretap channel (Section 3). Our result indicates that the key capacity is always positive, no matter how large the channel gain of the eavesdropper's channel is; in addition this holds even if the destination and eavesdropper CSI is available only at the destination and eavesdropper, respectively. Of course, the availability of the public channel implies that the destination CSI could be fed back to the source. However, due to the restrictions imposed on the secret-sharing strategies (see Section 2), only causal feedback is allowed, and thus any destination CSI available at source is "outdated." This does not turn out to be a problem since, unlike the approaches mentioned above, the source does not use the CSI to avoid sending secret information when the destination is not more capable than the eavesdropper's channel. As a matter of fact, the fading process of the destination channel provides a significant part of the common randomness from which the source and the destination distill a secret key. This fact is readily obtained from the alternative achievability proof given in Section 4. We note that [25, 26] consider the problem key generation from common randomness over wiretap channels and exploit a Wyner-Ziv coding scheme to limit the amount of information conveyed from the source to the destination via the wiretap channel. Unlike these previous works, we only employ Wyner-Ziv coding to quantize the destination channel outputs. Our code construction still relies on a public channel with unlimited capacity to achieve the key capacity.
Finally, we also investigate the limiting value of the key capacity under three asymptotic scenarios. In the first scenario, the transmission power of the source becomes asymptotically high (Corollary 1). In the second scenario, the destination and eavesdropper have a large number of antennas (Corollary 2). In the third scenario, the gain advantage of the eavesdropper's channel becomes asymptotically large (Corollary 3). These three scenarios reveal two different effects of spatial dimensionality upon key capacity. In the first scenario, we show that the key capacity levels off as the power increases if the eavesdropper has no fewer antennas than the source. On the other hand, when the source has more antennas, the key capacity can increase without bound with the source power. In the second scenario, we show that the spatial dimensionality advantage that the eavesdropper has over the destination has exactly the same effect as the channel gain advantage of the eavesdropper. In the third scenario, we show that the limiting key capacity is positive only if the eavesdropper has fewer antennas than the source. The results in these scenarios confirm that spatial dimensionality can be used to combat the eavesdropper's gain advantage, which was already observed for the MIMO wiretap channel. Perhaps more surprisingly, this is achieved with neither the source nor destination needing any eavesdropper CSI.

2. Secret Sharing and Key Capacity

We consider the CW model of [14], and we recall its characteristics for completeness. We consider three terminals, namely, a source, a destination, and an eavesdropper. The source sends symbols from an alphabet https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq2_HTML.gif . The destination and eavesdropper observe symbols belonging to alphabets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq3_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq4_HTML.gif , respectively. Unlike in [14], https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq5_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq6_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq7_HTML.gif need not to be discrete. In fact, in Section 3 we will assume that they are multi-dimensional vector spaces over the complex field. The channel from the source to the destination and eavesdropper is assumed memoryless. A generic symbol sent by the source is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq8_HTML.gif and the corresponding symbols observed by the destination and eavesdropper are denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq9_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq10_HTML.gif , respectively. For notational convenience (and without loss of generality), we assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq11_HTML.gif are jointly continuous, and the channel is specified by the conditional probability density function (pdf) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq12_HTML.gif . In addition, we restrict ourselves to cases in which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq13_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq14_HTML.gif are conditionally independent given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq15_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq16_HTML.gif , which is a reasonable model for symbols broadcast in a wireless medium. Hereafter, we drop the subscripts in pdfs whenever the concerned symbols are well specified by the arguments of the pdfs. We assume that an interactive, authenticated public channel with unlimited capacity is also available for communication between the source and destination. Here, interactive means that the channel is two-way and can be used multiple times, unlimited capacity means that it is noiseless and has infinite capacity, and public and authenticated mean that the eavesdropper can perfectly observe all communications over this channel but cannot tamper with the messages transmitted.
We consider the class of permissible secret-sharing strategies suggested in [14]. Consider https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq17_HTML.gif time instants labeled by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq18_HTML.gif , respectively. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq19_HTML.gif channel is used https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq20_HTML.gif times during these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq21_HTML.gif time instants at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq22_HTML.gif . Set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq23_HTML.gif . The public channel is used for the other ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq24_HTML.gif ) time instants. Before the secret-sharing process starts, the source and destination generate, respectively, independent random variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq25_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq26_HTML.gif . To simplify the notation, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq27_HTML.gif represent a sequence of messages/symbols https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq28_HTML.gif . Then a permissible strategy proceeds as follows.
(i)
At time instant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq29_HTML.gif , the source sends message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq30_HTML.gif to the destination, and the destination sends message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq31_HTML.gif to the source. Both transmissions are carried over the public channel.
 
(ii)
At time instant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq32_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq33_HTML.gif , the source sends the symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq34_HTML.gif to the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq35_HTML.gif channel. The destination and eavesdropper observe the corresponding symbols https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq36_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq37_HTML.gif . There is no message exchange via the public channel, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq38_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq39_HTML.gif are both null.
 
(iii)
At time instant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq40_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq41_HTML.gif , the source sends message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq42_HTML.gif to the destination, and the destination sends message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq43_HTML.gif to the source. Both transmissions are carried over the public channel.
 
At the end of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq44_HTML.gif time instants, the source generates its secret key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq45_HTML.gif , and the destination generates its secret key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq46_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq47_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq48_HTML.gif takes values from the same finite set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq49_HTML.gif .
According to [14], https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq50_HTML.gif is an achievable key rate through the channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq51_HTML.gif if for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq52_HTML.gif , there exists a permissible secret-sharing strategy of the form described above such that
(1)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq53_HTML.gif ,
 
(2)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq54_HTML.gif ,
 
(3)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq55_HTML.gif ,
 
(4)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq56_HTML.gif ,
 
for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq57_HTML.gif . The key capacity of the channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq58_HTML.gif is the largest achievable key rate through the channel. We are interested in finding the key capacity. For the case of continuous channel alphabets considered here, we also add the following power constraint to the symbol sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq59_HTML.gif sent out by the source:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ1_HTML.gif
(1)
with probability one (w.p.1) for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq60_HTML.gif .
Theorem 1.
The key capacity of a CW model https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq61_HTML.gif with conditional pdf https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq62_HTML.gif is given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq63_HTML.gif .
Proof.
The case with discrete channel alphabets is established in [14, Corollary 2 of Theorem 2], whose achievability proof (also the ones in [16, 17]) does not readily extend to continuous channel alphabets. Nevertheless the same single backward message strategy suggested in [14] is still applicable for continuous alphabets. That strategy uses https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq64_HTML.gif time instants with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq65_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq66_HTML.gif . That is, the source first sends https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq67_HTML.gif symbols through the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq68_HTML.gif channel; after receiving these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq69_HTML.gif symbols, the destination feeds back a single message at the last time instant to the source over the public channel. A carefully structured Wyner-Ziv code can be employed to support this secret-sharing strategy. The detailed arguments are provided in the alternative achievability proof in Section 4.
Here we outline an achievability argument based on the consideration of a conceptual wiretap channel from the destination back to the source and eavesdropper suggested in [13, Theorem 3]. First, assume the source sends a sequence of i.i.d. symbols https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq70_HTML.gif , each distributed according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq71_HTML.gif , over the wiretap channel. Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq72_HTML.gif . Because of the law of large numbers, we can assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq73_HTML.gif satisfies the power constraint (1) without loss of generality. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq74_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq75_HTML.gif be the observations of the the destinations and eavesdropper, respectively. To transmit a sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq76_HTML.gif of symbols independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq77_HTML.gif , the destination sends https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq78_HTML.gif back to the source via the public channel. This creates a conceptual memoryless wiretap channel from the destination with input symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq79_HTML.gif to the source in the presence of the eavesdropper, where the source observes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq80_HTML.gif while the eavesdropper observes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq81_HTML.gif .
Employing the continuous alphabet extension of the well known result in [3], the secrecy capacity of the conceptual wiretap channel (and hence the key capacity of the original channel) is lower bounded by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ2_HTML.gif
(2)
Note that the input symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq82_HTML.gif has no power constraint since the public channel has infinite capacity. But
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ3_HTML.gif
(3)
where the third equality results from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq83_HTML.gif due to the independence of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq84_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq85_HTML.gif , the first inequality follows from the fact
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ4_HTML.gif
(4)
which is again due to independence between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq86_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq87_HTML.gif , and the inequality on the last line follows from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq88_HTML.gif .
Without loss of generality and for notational simplicity, assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq89_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq90_HTML.gif are both one-dimensional real random variables. Now, choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq91_HTML.gif to be Gaussian distributed with mean https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq92_HTML.gif and variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq93_HTML.gif . Then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ5_HTML.gif
(5)
where the first inequality follows from [27, Theorem 8.6.5], and the last equality is due to the independence between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq94_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq95_HTML.gif . Combining (3) and (5), for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq96_HTML.gif , we can choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq97_HTML.gif large enough such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ6_HTML.gif
(6)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq98_HTML.gif is arbitrary, the key capacity is lower bounded by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq99_HTML.gif .
The converse proof in [14] is directly applicable to continuous channel alphabets, provided that the average power constraint (1) can be incorporated into the arguments in [14, pp. 1129-1130]. This latter requirement is simplified by the additive and symmetric nature of the average power constraint [28, Section 3.6]. To avoid too much repetition, we outline below only the steps of the proof that are not directly available in [14, pp. 1129-1130].
For every permissible strategy with achievable key rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq100_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ7_HTML.gif
(7)
where the second line follows from Fano's inequality, the third line results from conditions (1) and (7) in the definition of achievable key rate, and the last line is due to condition (5). Thus it suffices to upper bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq101_HTML.gif . From condition (3) in the definition of achievable key rate and the chain rule, we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ8_HTML.gif
(8)
where the second inequality is due to the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq102_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq103_HTML.gif . By repeated uses of the chain rule, the construction of permissible strategies, and the memoryless nature of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq104_HTML.gif channel, it is shown in [14, pp. 1129-1130] that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ9_HTML.gif
(9)
Now let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq105_HTML.gif be a uniform random variable that takes value from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq106_HTML.gif and is independent of all other random quantities. Define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq107_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq108_HTML.gif . Then it is obvious that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq109_HTML.gif , and (9) can be rewritten as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ10_HTML.gif
(10)
where the second inequality is due to the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq110_HTML.gif forms a Markov chain. On the other hand, the power constraint (1) implies that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ11_HTML.gif
(11)
Combining (7), (8), and (10), we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ12_HTML.gif
(12)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq111_HTML.gif can be arbitrarily small when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq112_HTML.gif is sufficiently large, (12), together with (11), gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ13_HTML.gif
(13)
where the last line is due to the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq113_HTML.gif .

3. Key Capacity of Fast-Fading MIMO Wiretap Channel

Consider that the source, destination, and eavesdropper have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq114_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq115_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq116_HTML.gif antennas, respectively. The antennas in each node are separated by at least a few wavelengths, and hence the fading processes of the channels across the transmit and receive antennas are independent. Using the complex baseband representation of the bandpass channel model:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ14_HTML.gif
(14)
where
(i)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq117_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq118_HTML.gif complex-valued transmit symbol vector by the source,
 
(ii)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq119_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq120_HTML.gif complex-valued receive symbol vector at the destination,
 
(iii)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq121_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq122_HTML.gif complex-valued receive symbol vector at the eavesdropper,
 
(iv)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq123_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq124_HTML.gif noise vector with independent identically distributed (i.i.d.) zero-mean, circular-symmetric complex Gaussian-distributed elements of variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq125_HTML.gif (i.e., the real and imaginary parts of each elements are independent zero-mean Gaussian random variables with the same variance),
 
(v)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq126_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq127_HTML.gif noise vector with i.i.d. zero-mean, circular-symmetric complex Gaussian-distributed elements of variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq128_HTML.gif ,
 
(vi)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq129_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq130_HTML.gif channel matrix from the source to destination with i.i.d. zero-mean, circular-symmetric complex Gaussian-distributed elements of unit variance,
 
(vii)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq131_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq132_HTML.gif channel matrix from the source to eavesdropper with i.i.d. zero-mean, circular-symmetric complex Gaussian-distributed elements of unit variance,
 
(viii)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq133_HTML.gif models the gain advantage of the eavesdropper over the destination.
 
Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq134_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq135_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq136_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq137_HTML.gif are independent. The wireless channel modeled by (14) is used https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq138_HTML.gif times as the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq139_HTML.gif channel described in Section 2 with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq140_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq141_HTML.gif . We assume that the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq142_HTML.gif uses of the wireless channel in (14) are i.i.d. so that the memoryless requirement of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq143_HTML.gif channel is satisfied. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq144_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq145_HTML.gif are included in the respective channel symbols observable by the destination and eavesdropper (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq146_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq147_HTML.gif , resp.), this model also implicitly assumes that the destination and eavesdropper have perfect CSI of their respective channels from the source. In practice, we can separate adjacent uses of the wireless channel by more than the coherence time of the channel to approximately ensure the i.i.d. channel use assumption. Training (known) symbols can be sent right before or after (within the channel coherence period) by the source so that the destination can acquire the required CSI. The eavesdropper may also use these training symbols to acquire the CSI of its own channel. If the CSI required at the destination is obtained in the way just described, then a unit of channel use includes the symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq148_HTML.gif together with the associated training symbols. However, as in [29], we do not count the power required to send the training symbols (cf. (1)). Moreover we note that the source (and also the eavesdropper) may get some information about the outdated CSI of the destination channel, because information about the destination channel CSI, up to the previous use, may be fed back to the source from the destination via the public channel. More specifically, at time instant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq149_HTML.gif , the source symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq150_HTML.gif is a function of the feedback message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq151_HTML.gif , which is in turn some function of the realizations of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq152_HTML.gif at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq153_HTML.gif . We also note that neither the source nor destination has any eavesdropper CSI. Referring back to (14), these two facts imply that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq154_HTML.gif is independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq155_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq156_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq157_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq158_HTML.gif ; that is, the current source symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq159_HTML.gif is independent of the current channel state.
Since the fading MIMO wiretap channel model in (14) is a special case of the CW model considered in Section 2, the key capacity https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq160_HTML.gif is given by Theorem 1 as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ15_HTML.gif
(15)
Note that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ16_HTML.gif
(16)
Substituting this back into (15), we get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ17_HTML.gif
(17)
As a result, the key capacity of the fast-fading wiretap channel described by (14) can be obtained by maximizing the conditional entropy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq161_HTML.gif . This maximization problem is solved below.
Theorem 2.
One has
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ18_HTML.gif
(18)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq162_HTML.gif denotes conjugate transpose.
Proof.
To determine the key capacity, we need the following upper bound on the conditional entropy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq163_HTML.gif .
Lemma 1.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq164_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq165_HTML.gif be two jointly distributed complex random vectors of dimensions https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq166_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq167_HTML.gif , respectively. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq168_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq169_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq170_HTML.gif be the covariance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq171_HTML.gif , covariance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq172_HTML.gif , and cross-covariance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq173_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq174_HTML.gif , respectively. If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq175_HTML.gif is invertible, then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ19_HTML.gif
(19)
The upper bound is achieved when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq176_HTML.gif is a circular-symmetric complex Gaussian random vector.
Proof.
We can assume that both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq177_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq178_HTML.gif have zero means without loss of generality. Also assume the existence of all unconditional and conditional covariances stated below. For each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq179_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ20_HTML.gif
(20)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq180_HTML.gif is the covariance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq181_HTML.gif with respect to the conditional density https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq182_HTML.gif [29, Lemma 2]. This implies
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ21_HTML.gif
(21)
The second inequality above is due to the concavity of the function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq183_HTML.gif over the set of positive definite symmetric matrices [30, 7.6.7], and the Jensen's inequality. To get the third inequality, observe that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq184_HTML.gif can be interpreted as the covariance of the estimation error of estimating https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq185_HTML.gif by the conditional mean estimator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq186_HTML.gif . On the other hand, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq187_HTML.gif is the covariance of the estimation error of using the linear minimum mean squared error estimator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq188_HTML.gif instead. The inequality results from the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq189_HTML.gif (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq190_HTML.gif is positive semidefinite) [31] and the inequality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq191_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq192_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq193_HTML.gif are positive definite, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq194_HTML.gif [30, , 7.7.4].
Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq195_HTML.gif is a circular-symmetric complex Gaussian random vector. For each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq196_HTML.gif , the conditional covariance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq197_HTML.gif , conditioned on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq198_HTML.gif , is the same as the (unconditional) covariance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq199_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq200_HTML.gif is a circular-symmetric complex Gaussian random vector [29, Lemma 3] , so is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq201_HTML.gif conditioned on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq202_HTML.gif . Hence by [29, Lemma 2], the upper bound in (20) is achieved with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq203_HTML.gif , which also gives the upper bound in (21).
To prove the theorem, we first obtain an upper bound on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq204_HTML.gif and then show that the upper bound is achievable. Using Lemma 1, we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ22_HTML.gif
(22)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq205_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq206_HTML.gif are, respectively, the conditional covariances of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq207_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq208_HTML.gif , given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq209_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq210_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq211_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq212_HTML.gif are the corresponding conditional cross-covariances. Substituting (22) into (17), an upper bound on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq213_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ23_HTML.gif
(23)
Thus we need to solve the maximization problem (23). To do so, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq214_HTML.gif be the (nonnegative) eigenvalues of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq215_HTML.gif . Since both the distributions of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq216_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq217_HTML.gif are invariant to any unitary transformation [29, Lemma 5], we can without any ambiguity define
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ24_HTML.gif
(24)
That is, we can assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq218_HTML.gif with no loss of generality. Then we have the following lemma, which suggests that the objective function in (23) is a concave function depending only on the eigenvalues of the covariance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq219_HTML.gif .
Lemma 2.
Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq220_HTML.gif has an arbitrary covariance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq221_HTML.gif , whose (nonnegative) eigenvalues are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq222_HTML.gif , then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ25_HTML.gif
(25)
is concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq223_HTML.gif .
Proof.
First write https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq224_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq225_HTML.gif . It is easy to see from (14) that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq226_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq227_HTML.gif . Then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ26_HTML.gif
(26)
where the last equality is due to the matrix inversion formula. Substituting this result into the left-hand side of (25), we obtain the right-hand side of (24), and hence (25).
To show concavity of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq228_HTML.gif , it suffices to consider only diagonal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq229_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq230_HTML.gif . Note that the mapping https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq231_HTML.gif is linear in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq232_HTML.gif . Also the mapping https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq233_HTML.gif is matrix-concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq234_HTML.gif [32, Ex. 3.58]. Thus the composition theorem [32] gives that the mapping https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq235_HTML.gif is matrix-concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq236_HTML.gif , since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq237_HTML.gif . Another use of the composite theorem together with the concavity of the function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq238_HTML.gif as mentioned in the proof of Lemma 1 shows that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq239_HTML.gif is concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq240_HTML.gif . Thus (25) implies that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq241_HTML.gif is also concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq242_HTML.gif .
Hence it suffices to consider only those https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq243_HTML.gif with zero mean in (23).
Now define the constraint set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq244_HTML.gif . Lemma 2 implies that we can find the upper bound on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq245_HTML.gif by calculating https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq246_HTML.gif , whose value is given by the next lemma.
Lemma 3.
One has
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ27_HTML.gif
(27)
Proof.
Since the elements of both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq247_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq248_HTML.gif are i.i.d., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq249_HTML.gif is invariant to any permutation of its arguments. This means that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq250_HTML.gif is a symmetric function. By Lemma 2, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq251_HTML.gif is also concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq252_HTML.gif . Thus it is Schur-concave [33]. Hence a Schur-minimal element (an element majorized by any another element) in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq253_HTML.gif maximizes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq254_HTML.gif . It is easy to check that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq255_HTML.gif is Schur-minimal in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq256_HTML.gif . Hence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq257_HTML.gif .
Combining the results in (23), (24), Lemmas 2 and 3, we obtain the upper bound on the key capacity as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ28_HTML.gif
(28)
where the identity https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq258_HTML.gif for invertible https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq259_HTML.gif [34, Theorem 18.1.1] has been used.
On the other hand, consider choosing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq260_HTML.gif to have i.i.d. zero-mean, circular-symmetric complex Gaussian-distributed elements of variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq261_HTML.gif . Then conditioned on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq262_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq263_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq264_HTML.gif are a circular-symmetric complex Gaussian random vector, by applying [29, Lemmas 3 and 4] to the linear model of (14). Hence Lemma 1 gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ29_HTML.gif
(29)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq265_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq266_HTML.gif . Substituting this back into (16) and using the matrix inversion formula to simplify the resulting expression, we obtain the same expression on the first line of (28) for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq267_HTML.gif . Thus the upper bound in (28) is achievable with this choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq268_HTML.gif ; hence it is in fact the key capacity.
In Figure 1, the key capacities of several fast-fading MIMO channels with different numbers of source, destination, and eavesdropper antennas are plotted against the source signal-to-noise ratio (SNR) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq269_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq270_HTML.gif . The channel gain advantage of the eavesdropper is set to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq271_HTML.gif . We observe that the key capacity levels off as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq272_HTML.gif increases in three of the four channels, except the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq273_HTML.gif , considered in Figure 1. It appears that the relative antenna dimensions determine the asymptotic behavior of the key capacity when the SNR is large. To more precisely study this behavior, we evaluate the limiting value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq274_HTML.gif as the input power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq275_HTML.gif of the source becomes very large. To highlight the dependence of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq276_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq277_HTML.gif , we use the notation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq278_HTML.gif .
Corollary 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq281_HTML.gif If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq282_HTML.gif , then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ30_HTML.gif
(30)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq283_HTML.gif Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq284_HTML.gif . Define
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ31_HTML.gif
(31)
Then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq285_HTML.gif .
Proof.
First fix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq286_HTML.gif or equivalently https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq287_HTML.gif , and consider the mapping https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq288_HTML.gif defined in the proof of Lemma 2 as a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq289_HTML.gif . Also define
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ32_HTML.gif
(32)
Thus https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq290_HTML.gif . It is not hard to check that for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq291_HTML.gif , which implies that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq292_HTML.gif . Hence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq293_HTML.gif is increasing in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq294_HTML.gif . Since the elements of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq295_HTML.gif are continuously i.i.d., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq296_HTML.gif w.p.1. Thus the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq297_HTML.gif (resp., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq298_HTML.gif ) is invertible w.p.1 when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq299_HTML.gif (resp., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq300_HTML.gif ).
Now, consider the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq301_HTML.gif . As in (28), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ33_HTML.gif
(33)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq302_HTML.gif is invertible w.p.1,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ34_HTML.gif
(34)
Hence Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq303_HTML.gif of the lemma results from monotone convergence.
For the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq304_HTML.gif , the matrix inversion formula allows us to instead write
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ35_HTML.gif
(35)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq305_HTML.gif is invertible w.p.1, we can also define
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ36_HTML.gif
(36)
Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq306_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq307_HTML.gif is of rank https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq308_HTML.gif w.p.1, it has the singular value decomposition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq309_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq310_HTML.gif is a diagonal matrix whose diagonal elements are the positive singular values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq311_HTML.gif . Also let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq312_HTML.gif ; that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq313_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq314_HTML.gif consist , respectively, of the first https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq315_HTML.gif and the last https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq316_HTML.gif columns of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq317_HTML.gif . Employing the unitary property of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq318_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq319_HTML.gif , it is not hard to verify that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ37_HTML.gif
(37)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ38_HTML.gif
(38)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq320_HTML.gif . From (37) and (38), it is clear that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq321_HTML.gif .
Further let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq322_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq323_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ39_HTML.gif
(39)
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq324_HTML.gif be the positive eigenvalues of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq325_HTML.gif . Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq326_HTML.gif , because of the fact that the elements of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq327_HTML.gif are continuously i.i.d. and are independent of the elements of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq328_HTML.gif . Hence, from (38), (39), and the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq329_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ40_HTML.gif
(40)
Now note that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ41_HTML.gif
(41)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq330_HTML.gif denotes the Penrose-Moore pseudoinverse of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq331_HTML.gif . Then (40) implies that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ42_HTML.gif
(42)
Hence by Fatou's lemma, we get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ43_HTML.gif
(43)
From (38), it is clear that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq332_HTML.gif increases without bound in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq333_HTML.gif w.p.1; hence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq334_HTML.gif also increases without bound. Combining this fact with (43), we arrive at the conclusion of Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq335_HTML.gif of the lemma.
Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq336_HTML.gif of the lemma verifies the observations shown in Figure 1 that the key capacity levels off as the SNR increases if the number of source antennas is no larger than that of eavesdropper antennas. When the source has more antennas, Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq337_HTML.gif of the lemma suggests that the key capacity can grow without bound as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq338_HTML.gif increases similarly to a MIMO fading channel with capacity https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq339_HTML.gif . Note that the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq340_HTML.gif in the expression that defines https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq341_HTML.gif is a projection matrix to the orthogonal complement of the column space of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq342_HTML.gif . Thus https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq343_HTML.gif has the physical interpretation that the secret information is passed across the dimensions not observable by the eavesdropper. The most interesting aspect is that this mode of operation can be achieved even if neither the source nor the destination knows the channel matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq344_HTML.gif .
We note that the asymptotic behavior of the key capacity in the high SNR regime summarized in Corollary 1 is similar to the idea of secrecy degree of freedom introduced in [35]. The subtle difference here is that no up-to-date CSI of the destination channel is needed at the source.
Another interesting observation from Figure 1 is that for the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq345_HTML.gif , the source power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq346_HTML.gif seems to have little effect on the key capacity. A small amount of source power is enough to get close to the leveling key capacity of about https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq347_HTML.gif bit per channel use. This observation is generalized below by Corollary 2, which characterizes the effect of spatial dimensionality of the destination and eavesdropper on the key capacity when the destination and eavesdropper both have a large number of antennas.
Corollary 2.
When https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq348_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq349_HTML.gif approach infinity in such a way that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq350_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ44_HTML.gif
(44)
Proof.
This corollary is a direct consequence of the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq351_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq352_HTML.gif w.p.1, which is in turn due to the strong law of large numbers.
Note that we can interpret the ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq353_HTML.gif as the spatial dimensionality advantage of the eavesdropper over the destination. The expression for the limiting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq354_HTML.gif in the corollary clearly indicates that this spatial dimensionality advantage affects the key capacity in the same way as the channel gain advantage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq355_HTML.gif .
In Figure 2, the key capacities of several fast-fading MIMO channels with different numbers of source, destination, and eavesdropper antennas are plotted against the eavesdropper's channel gain advantage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq356_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq357_HTML.gif  dB. The results in Figure 2 show the other effect of spatial dimensionality. We observe that the key capacity decreases almost reciprocally with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq358_HTML.gif in the channels with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq359_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq360_HTML.gif , but stays almost constant for the channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq361_HTML.gif . It seems that the relative numbers of source and eavesdropper antennas again play the main role in differentiating these two different behaviors of the key capacity. To verify that, we evaluate the limiting value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq362_HTML.gif as the gain advantage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq363_HTML.gif of the eavesdropper becomes very large. To highlight the dependence of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq364_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq365_HTML.gif , we use the notation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq366_HTML.gif .
Corollary 3.
One has
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ45_HTML.gif
(45)
Proof.
Similar to the proof of Corollary 1.
Similar to the case of large SNR, when the number of source antennas is larger than that of the eavesdropper's antennas, secret information can be passed across the dimensions not observable by the eavesdropper. This can be achieved with neither the source nor the destination knowing the channel matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq369_HTML.gif .

4. Alternative Achievability of Key Capacity

In this section, we provide an alternative proof of achievability for key capacity, which does not require the transmission of continuous symbols over the public channel. We derive the result from "first principles," which provides more insight on the desirable structure of a practical key agreement scheme. The main steps of the key agreement procedure are the following:
(1)
the source sends a sequence of i.i.d. symbols https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq370_HTML.gif ;
 
(2)
the destination "quantizes" its received sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq371_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq372_HTML.gif with a Wyner-Ziv compression scheme;
 
(3)
the destination uses a binning scheme with the quantized symbol sequences to determine the secret key and the information to feedback to the source over the public channel;
 
(4)
the source exploits the information sent by the destination to reconstruct the destination's quantized sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq373_HTML.gif and uses the same binning scheme to generate its secret key.
 
The secrecy of the resulting key is established by carefully structuring the binning scheme.
For the memoryless wiretap channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq374_HTML.gif specified by the joint pdf https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq375_HTML.gif , consider the quadruple https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq376_HTML.gif defined by the joint pdf https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq377_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq378_HTML.gif to be specified later. We assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq379_HTML.gif takes values in the alphabet https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq380_HTML.gif . Given a sequence of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq381_HTML.gif elements https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq382_HTML.gif unless otherwise specified. Similar notation and convention apply to all other sequences as well as their corresponding pdfs and conditional pdfs considered hereafter.

4.1. Random Code Generation

Choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq383_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq384_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq385_HTML.gif , and let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq386_HTML.gif denote the corresponding marginal. Note that the existence of such https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq387_HTML.gif can be assumed without loss of generality if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq388_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq389_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq390_HTML.gif , there is nothing to prove. Similarly, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq391_HTML.gif , the construction below can be trivially modified to show that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq392_HTML.gif is an achievable key rate.
Fix a small (small enough so that the various rate definitions and bounds on probabilities below make sense and are nontrivial) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq393_HTML.gif . Let us define
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ46_HTML.gif
(46)
For each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq394_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq395_HTML.gif , generate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq396_HTML.gif codewords https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq397_HTML.gif according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq398_HTML.gif . The set of codewords https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq399_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq400_HTML.gif forms a subcode denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq401_HTML.gif . The union of all subcodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq402_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq403_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq404_HTML.gif forms the code https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq405_HTML.gif . For convenience, we denote the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq406_HTML.gif codewords in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq407_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq408_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq409_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq410_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq411_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq412_HTML.gif . The code https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq413_HTML.gif and its subcodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq414_HTML.gif is revealed to the source, destination, and eavesdropper. In the following, we refer to a codeword or its index in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq415_HTML.gif interchangeably. Under this convention, the subcode https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq416_HTML.gif are also the set that contains all the indices of its codewords. Denote https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq417_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq418_HTML.gif .

4.2. Secret Sharing Procedure

For convenience, we define the joint typicality indicator function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq419_HTML.gif that takes in a number of sequences as its arguments. The value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq420_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq421_HTML.gif if the sequences are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq422_HTML.gif -jointly typical, and the value is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq423_HTML.gif otherwise. Further define the indicator function for the sequence pair https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq424_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ47_HTML.gif
(47)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq425_HTML.gif is distributed according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq426_HTML.gif in the definition above.
The source generates a random sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq427_HTML.gif distributed according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq428_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq429_HTML.gif satisfies the average power constraint (1), the source sends https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq430_HTML.gif through the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq431_HTML.gif channel. Otherwise, it ends the secret-sharing process. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq432_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq433_HTML.gif , the law of large numbers implies that the probability of the latter event can be made arbitrarily small by increasing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq434_HTML.gif . Hence we can assume below, with no loss of generality, that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq435_HTML.gif satisfies (1) and is sent by the source. This assumption helps to make the probability calculations in Section 4.3 less tedious.
Upon reception of the sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq436_HTML.gif , the destination tries to quantize the received sequence. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq437_HTML.gif be the output of its quantizer. Specifically, if there is a unique sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq438_HTML.gif for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq439_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq440_HTML.gif , then it sets the output of the quantizer to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq441_HTML.gif . If there is more than one such sequence, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq442_HTML.gif is set to be the smallest sequence index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq443_HTML.gif . If there is no such sequence, it sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq444_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq445_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq446_HTML.gif be the unique indices such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq447_HTML.gif . The index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq448_HTML.gif will be used as the key while the index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq449_HTML.gif is fed back to the source over the public channel, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq450_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq451_HTML.gif , set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq452_HTML.gif and choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq453_HTML.gif randomly over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq454_HTML.gif with uniform probabilities.
After receiving the feedback information https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq455_HTML.gif via the public channel, the source attempts to find a unique https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq456_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq457_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq458_HTML.gif . If there is such a unique https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq459_HTML.gif , the source decodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq460_HTML.gif . If there is no such sequence or more than one such sequence, the source sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq461_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq462_HTML.gif , it sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq463_HTML.gif . Finally, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq464_HTML.gif , the source generates its key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq465_HTML.gif , such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq466_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq467_HTML.gif , it sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq468_HTML.gif .
We also consider a fictitious receiver who observes the sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq469_HTML.gif and obtains both indices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq470_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq471_HTML.gif via the public channel. This receiver sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq472_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq473_HTML.gif . Otherwise, it attempts to find a unique https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq474_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq475_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq476_HTML.gif . If there is such a unique https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq477_HTML.gif , the source decodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq478_HTML.gif . If there is no such sequence or more than one such sequence, the source sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq479_HTML.gif .

4.3. Analysis of Probability of Error

We use a random coding argument to establish the existence of a code with rates given by (46) such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq480_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq481_HTML.gif vanish in the limit of large block length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq482_HTML.gif . Without further clarification, we note that the probabilities of the events below, except otherwise stated, are over the joint distribution of the codebook https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq483_HTML.gif , codewords, and all other random quantities involved.
Before we proceed, we introduce the following lemma regarding the indicator function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq484_HTML.gif .
Lemma 4.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq485_HTML.gif If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq486_HTML.gif distributes according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq487_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq488_HTML.gif for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq489_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq490_HTML.gif If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq491_HTML.gif distributes according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq492_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq493_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq494_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq495_HTML.gif If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq496_HTML.gif distributes according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq497_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq498_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq499_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq500_HTML.gif If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq501_HTML.gif distributes according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq502_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq503_HTML.gif for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq504_HTML.gif .
Proof.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq505_HTML.gif This claim is actually shown in [36]. We briefly sketch the proof here using our notation for completeness and easy reference. By the reverse Markov inequality [36],
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ48_HTML.gif
(48)
where the second inequality is due to that fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq506_HTML.gif for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq507_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq508_HTML.gif First, we only need to consider typical https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq509_HTML.gif since the bound is trivial when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq510_HTML.gif is not typical. Notice that for any such https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq511_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ49_HTML.gif
(49)
Hence
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ50_HTML.gif
(50)
Now
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ51_HTML.gif
(51)
where the last inequality is due to (50).
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq512_HTML.gif Same as Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq513_HTML.gif , interchanging the roles of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq514_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq515_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq516_HTML.gif From Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq517_HTML.gif , we get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ52_HTML.gif
(52)
Moreover we need to bound the probabilities of the following events pertaining to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq518_HTML.gif .
Lemma 5.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq519_HTML.gif for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq520_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq521_HTML.gif For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq522_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq523_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq524_HTML.gif When https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq525_HTML.gif is sufficiently large, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq526_HTML.gif uniformly for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq527_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq528_HTML.gif When https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq529_HTML.gif is sufficiently large, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq530_HTML.gif uniformly for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq531_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq532_HTML.gif .
Proof.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq533_HTML.gif We will use an argument similar to the one in the achievability proof of rate distortion function in [27, Section 10.5] to bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq534_HTML.gif . First note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq535_HTML.gif is the event that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq536_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq537_HTML.gif , and hence
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ53_HTML.gif
(53)
where the second equality is due to the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq538_HTML.gif are i.i.d. given each fixed https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq539_HTML.gif . But
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ54_HTML.gif
(54)
where the inequality on the fourth line is due to the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq540_HTML.gif implies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq541_HTML.gif , and the last line results from the inequality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq542_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq543_HTML.gif and positive integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq544_HTML.gif [27, Lemma 10.5.3]. Substituting (54) back into (53) and using Lemma 4 Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq545_HTML.gif , we get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ55_HTML.gif
(55)
for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq546_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq547_HTML.gif Notice that for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq548_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ56_HTML.gif
(56)
where the second equality results from the i.i.d. nature of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq549_HTML.gif . Thus we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ57_HTML.gif
(57)
where the last inequality is due to Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq550_HTML.gif of Lemma 4 since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq551_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq552_HTML.gif are independent.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq553_HTML.gif From (56), we have the lower bound
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ58_HTML.gif
(58)
where the first inequality is due to Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq554_HTML.gif of Lemma 4, and the second inequality is from Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq555_HTML.gif of Lemma 4 when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq556_HTML.gif is sufficiently large. Note that the same sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq557_HTML.gif is enough to guarantee the validity of the lower bound above for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq558_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq559_HTML.gif First note that, for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq560_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq561_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ59_HTML.gif
(59)
Thus applying Part ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq562_HTML.gif ) of the lemma, we get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ60_HTML.gif
(60)
uniformly for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq563_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq564_HTML.gif , when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq565_HTML.gif is sufficiently large. The third lower bound of (60) above is obtained from the inequality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq566_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq567_HTML.gif and positive integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq568_HTML.gif . The fourth lower bound is in turn based on the inequality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq569_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq570_HTML.gif and positive integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq571_HTML.gif .
We first consider the error event https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq572_HTML.gif . Note that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ61_HTML.gif
(61)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq573_HTML.gif is the event https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq574_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq575_HTML.gif is the event that there is an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq576_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq577_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq578_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq579_HTML.gif . From (56), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ62_HTML.gif
(62)
where the equality on the fourth line is due to the i.i.d. nature of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq580_HTML.gif , the equality on the fifth line results from the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq581_HTML.gif (since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq582_HTML.gif ), and the inequality on the second last line is from the definition of the indicator function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq583_HTML.gif .
Similarly assuming https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq584_HTML.gif , we have from(56)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ63_HTML.gif
(63)
where the equality on the third line is due to the independence between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq585_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq586_HTML.gif , and the last inequality results from Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq587_HTML.gif of Lemma 4 and the bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq588_HTML.gif , which is a direct result of [27, Theorem 15.2.2]. Hence, substituting the bounds in (62) and (63) back into (61) and using Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq589_HTML.gif of Lemma 5, we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ64_HTML.gif
(64)
for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq590_HTML.gif is sufficiently large.
Next we consider the event https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq591_HTML.gif . Define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq592_HTML.gif as the event https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq593_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq594_HTML.gif as the event that there is an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq595_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq596_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq597_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq598_HTML.gif . Then we have, when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq599_HTML.gif is sufficiently large, uniformly for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq600_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq601_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ65_HTML.gif
(65)
Note that the inequality on the third line of (65) results from upper bounds of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq602_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq603_HTML.gif , which can be obtained in ways almost identical to the derivations in (62) and (63), respectively. The inequality on the fourth line is, on the other hand, due to Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq604_HTML.gif of Lemma 5.
By expurgating the random code ensemble, we obtain the following lemma.
Lemma 6.
For any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq605_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq606_HTML.gif sufficiently large, there exists a code https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq607_HTML.gif with the rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq608_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq609_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq610_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq611_HTML.gif given by (46) such that
(1)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq612_HTML.gif ,
 
(2)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq613_HTML.gif ,
 
(3)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq614_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq615_HTML.gif ,
 
(4)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq616_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq617_HTML.gif .
 
Proof.
Combining Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq618_HTML.gif of Lemma 5, (64), and (65), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ66_HTML.gif
(66)
for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq619_HTML.gif . This implies that there must exist a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq620_HTML.gif satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq621_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq622_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq623_HTML.gif . Thus, Parts https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq624_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq625_HTML.gif are proved.
Now, fix this https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq626_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq627_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq628_HTML.gif be the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq629_HTML.gif th codeword of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq630_HTML.gif . Then, by Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq631_HTML.gif of Lemma 4,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ67_HTML.gif
(67)
hence, Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq632_HTML.gif results.
Note that, for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq633_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ68_HTML.gif
(68)
We know from the discussion above that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq634_HTML.gif . Also from Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq635_HTML.gif of the lemma,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ69_HTML.gif
(69)
Putting these back into (68), we get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ70_HTML.gif
(70)
for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq636_HTML.gif . Thus, Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq637_HTML.gif is proved.
In the remainder of the paper, we use a fixed code https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq638_HTML.gif identified by Lemma 6. For convenience, we drop the conditioning on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq639_HTML.gif .

4.4. Secrecy Analysis

First we proceed to bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq640_HTML.gif . Note that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ71_HTML.gif
(71)
Using Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq641_HTML.gif of Lemma 6 together with Fano's inequality gives https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq642_HTML.gif . Moreover Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq643_HTML.gif of Lemma 6 implies that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq644_HTML.gif . Putting these bounds back into (71), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ72_HTML.gif
(72)
Next we bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq645_HTML.gif . Note that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ73_HTML.gif
(73)
where the last inequality is obtained from Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq646_HTML.gif of Lemma 6 and Fano's inequality like before. In addition, it holds that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ74_HTML.gif
(74)
where the second last inequality follows from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq647_HTML.gif , and the last inequality follows from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq648_HTML.gif (by definition of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq649_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq650_HTML.gif ) and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq651_HTML.gif (by Fano's inequality applied to the fictitious receiver). By construction of the code https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq652_HTML.gif , it holds that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq653_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq654_HTML.gif . In addition, Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq655_HTML.gif of Lemma 6 implies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq656_HTML.gif . Finally, note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq657_HTML.gif by the data-processing inequality since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq658_HTML.gif is a deterministic function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq659_HTML.gif and the memoryless property of the channel between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq660_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq661_HTML.gif . Combining these observations and substituting the values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq662_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq663_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq664_HTML.gif given by (46) back into (73), we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ75_HTML.gif
(75)
when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq665_HTML.gif is sufficiently large. Without any rate limitation on the public channel, we can choose the transition probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq666_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq667_HTML.gif ; therefore,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_Equ76_HTML.gif
(76)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq668_HTML.gif can be chosen arbitrarily, Part https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq669_HTML.gif of Lemma 6, (72), and (76), establish the achievability of the secret key rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F506973/MediaObjects/13638_2008_Article_1680_IEq670_HTML.gif .

5. Conclusion

We evaluated the key capacity of the fast-fading MIMO wiretap channel. We found that spatial dimensionality provided by the use of multiple antennas at the source and destination can be employed to combat a channel-gain advantage of the eavesdropper over the destination. In particular if the source has more antennas than the eavesdropper, then the channel gain advantage of the eavesdropper can be completely overcome in the sense that the key capacity does not vanish when the eavesdropper channel gain advantage becomes asymptotically large. This is the most interesting observation of this paper, as no eavesdropper CSI is needed at the source or destination to achieve the non-vanishing key capacity.

Acknowledgments

The work of T. F. Wong and J. M. Shea was supported in part by the National Science Foundation under Grant CNS-0626863 and by the Air Force Office of Scientific Research under Grant FA9550-07-10456. The authors would also like to thank Dr. Shlomo Shamai and the anonymous reviewers for their detailed comments and thoughtful suggestions. They are grateful to the reviewer who pointed out a significant oversight in the proof of Theorem 1 in the original version of the paper. They are also indebted to another reviewer who suggested the concavity argument in the proof of Lemma 2, which is much more elegant than the authors' original one.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
2.
go back to reference Leung-Yan-Cheong SK, Hellman M: The Gaussian wire-tap channel. IEEE Transactions on Information Theory 1978, 24(4):451-456. 10.1109/TIT.1978.1055917MathSciNetCrossRefMATH Leung-Yan-Cheong SK, Hellman M: The Gaussian wire-tap channel. IEEE Transactions on Information Theory 1978, 24(4):451-456. 10.1109/TIT.1978.1055917MathSciNetCrossRefMATH
3.
go back to reference Csiszár I, Korner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892CrossRefMathSciNetMATH Csiszár I, Korner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892CrossRefMathSciNetMATH
4.
go back to reference Liang Y, Poor H, Shamai S: Secure communication over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2470-2492.MathSciNetCrossRefMATH Liang Y, Poor H, Shamai S: Secure communication over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2470-2492.MathSciNetCrossRefMATH
5.
go back to reference Gopala P, Lai L, El Gamal H: On the secrecy capacity of fading channels. IEEE Transactions on Information Theory 2008, 54(10):4687-4698.MathSciNetCrossRefMATH Gopala P, Lai L, El Gamal H: On the secrecy capacity of fading channels. IEEE Transactions on Information Theory 2008, 54(10):4687-4698.MathSciNetCrossRefMATH
6.
go back to reference Bloch M, Barros J, Rodrigues M, McLaughlin SW: Wireless information-theoretic security. IEEE Transactions on Information Theory 2008, 54(6):2515-2534.MathSciNetCrossRefMATH Bloch M, Barros J, Rodrigues M, McLaughlin SW: Wireless information-theoretic security. IEEE Transactions on Information Theory 2008, 54(6):2515-2534.MathSciNetCrossRefMATH
7.
go back to reference Khisti A, Tchamkerten A, Wornell G: Secure broadcasting over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2453-2469.MathSciNetCrossRefMATH Khisti A, Tchamkerten A, Wornell G: Secure broadcasting over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2453-2469.MathSciNetCrossRefMATH
8.
go back to reference Shafiee S, Liu N, Ulukus S: Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel. IEEE Transactions on Information Theory 2009, 55(9):4033-4039.MathSciNetCrossRef Shafiee S, Liu N, Ulukus S: Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel. IEEE Transactions on Information Theory 2009, 55(9):4033-4039.MathSciNetCrossRef
10.
go back to reference Oggier F, Hassibi B: The secrecy capacity of the MIMO wiretap channel. Proceedings of the 45th Allerton Conference on Communication, Control and Computing, September 2007, Monticello, Ill, USA 848-855. Oggier F, Hassibi B: The secrecy capacity of the MIMO wiretap channel. Proceedings of the 45th Allerton Conference on Communication, Control and Computing, September 2007, Monticello, Ill, USA 848-855.
11.
go back to reference Liu T, Shamai S: A note on the secrecy capacity of the multi-antenna wiretap channel. IEEE Transactions on Information Theory 2009, 55(6):2547-2553.MathSciNetCrossRef Liu T, Shamai S: A note on the secrecy capacity of the multi-antenna wiretap channel. IEEE Transactions on Information Theory 2009, 55(6):2547-2553.MathSciNetCrossRef
12.
go back to reference Bustin R, Liu R, Poor HV, Shamai S: An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '09), July 2009, Seoul, Korea 2602-2606. Bustin R, Liu R, Poor HV, Shamai S: An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '09), July 2009, Seoul, Korea 2602-2606.
13.
go back to reference Maurer UM: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 1993, 39(3):733-742.CrossRefMathSciNetMATH Maurer UM: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 1993, 39(3):733-742.CrossRefMathSciNetMATH
14.
go back to reference Ahlswede R, Csiszár I: Common randomness in information theory and cryptography—part I: secret sharing. IEEE Transactions on Information Theory 1993, 39(4):1121-1132. 10.1109/18.243431CrossRefMATH Ahlswede R, Csiszár I: Common randomness in information theory and cryptography—part I: secret sharing. IEEE Transactions on Information Theory 1993, 39(4):1121-1132. 10.1109/18.243431CrossRefMATH
15.
go back to reference Csiszár I, Narayan P: Common randomness and secret key generation with a helper. IEEE Transactions on Information Theory 2000, 46(2):344-366. 10.1109/18.825796CrossRefMathSciNetMATH Csiszár I, Narayan P: Common randomness and secret key generation with a helper. IEEE Transactions on Information Theory 2000, 46(2):344-366. 10.1109/18.825796CrossRefMathSciNetMATH
16.
go back to reference Csiszár I, Narayan P: Secrecy capacities for multiple terminals. IEEE Transactions on Information Theory 2004, 50(12):3047-3061. 10.1109/TIT.2004.838380CrossRefMathSciNetMATH Csiszár I, Narayan P: Secrecy capacities for multiple terminals. IEEE Transactions on Information Theory 2004, 50(12):3047-3061. 10.1109/TIT.2004.838380CrossRefMathSciNetMATH
17.
go back to reference Csiszár I, Narayan P: Secrecy capacities for multiterminal channel models. IEEE Transactions on Information Theory 2008, 54(6):2437-2452.CrossRefMathSciNetMATH Csiszár I, Narayan P: Secrecy capacities for multiterminal channel models. IEEE Transactions on Information Theory 2008, 54(6):2437-2452.CrossRefMathSciNetMATH
18.
go back to reference Bennett CH, Brassard G, Crepeau C, Maurer UM: Generalized privacy amplification. IEEE Transactions on Information Theory 1995, 41(6):1915-1923. 10.1109/18.476316MathSciNetCrossRefMATH Bennett CH, Brassard G, Crepeau C, Maurer UM: Generalized privacy amplification. IEEE Transactions on Information Theory 1995, 41(6):1915-1923. 10.1109/18.476316MathSciNetCrossRefMATH
19.
go back to reference Maurer U, Wolf S: Secret-key agreement over unauthenticated public channels—part I: definitions and a completeness result. IEEE Transactions on Information Theory 2003, 49(4):822-831. 10.1109/TIT.2003.809563MathSciNetCrossRefMATH Maurer U, Wolf S: Secret-key agreement over unauthenticated public channels—part I: definitions and a completeness result. IEEE Transactions on Information Theory 2003, 49(4):822-831. 10.1109/TIT.2003.809563MathSciNetCrossRefMATH
20.
go back to reference Maurer U, Wolf S: Secret-key agreement over unauthenticated public channels—part II: the simulatability condition. IEEE Transactions on Information Theory 2003, 49(4):832-838. 10.1109/TIT.2003.809560MathSciNetCrossRefMATH Maurer U, Wolf S: Secret-key agreement over unauthenticated public channels—part II: the simulatability condition. IEEE Transactions on Information Theory 2003, 49(4):832-838. 10.1109/TIT.2003.809560MathSciNetCrossRefMATH
21.
go back to reference Maurer U, Wolf S: Secret-key agreement over unauthenticated public channels—part III: privacy amplification. IEEE Transactions on Information Theory 2003, 49(4):839-851. 10.1109/TIT.2003.809559MathSciNetCrossRefMATH Maurer U, Wolf S: Secret-key agreement over unauthenticated public channels—part III: privacy amplification. IEEE Transactions on Information Theory 2003, 49(4):839-851. 10.1109/TIT.2003.809559MathSciNetCrossRefMATH
22.
go back to reference Lai L, El Gamal H, Poor H: The wiretap channel with feedback: encryption over the channel. IEEE Transactions on Information Theory 2008, 54(11):5059-5067.MathSciNetCrossRefMATH Lai L, El Gamal H, Poor H: The wiretap channel with feedback: encryption over the channel. IEEE Transactions on Information Theory 2008, 54(11):5059-5067.MathSciNetCrossRefMATH
23.
go back to reference Tekin E, Yener A: Effects of cooperation on the secrecy of multiple access channels with generalized feedback. Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS '08), March 2008, Princeton, NJ, USA Tekin E, Yener A: Effects of cooperation on the secrecy of multiple access channels with generalized feedback. Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS '08), March 2008, Princeton, NJ, USA
24.
go back to reference Tekin E, Yener A: The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory 2008, 54(6):2735-2751.MathSciNetCrossRefMATH Tekin E, Yener A: The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory 2008, 54(6):2735-2751.MathSciNetCrossRefMATH
25.
go back to reference Khisti A, Diggavi S, Wornell G: Secret-key generation with correlated sources and noisy channels. Proceedings of IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Canada 1005-1009. Khisti A, Diggavi S, Wornell G: Secret-key generation with correlated sources and noisy channels. Proceedings of IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Canada 1005-1009.
26.
go back to reference Prabhakaran V, Eswaran K, Ramchandran K: Secrecy via sources and channels—a secret key—secret message rate tradeoff region. Proceedings of the IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Canada 1010-1014. Prabhakaran V, Eswaran K, Ramchandran K: Secrecy via sources and channels—a secret key—secret message rate tradeoff region. Proceedings of the IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Canada 1010-1014.
27.
go back to reference Cover T, Thomas J: Elements of Information Theory. 2nd edition. Wiley-Interscience, New York, NY, USA; 2006.MATH Cover T, Thomas J: Elements of Information Theory. 2nd edition. Wiley-Interscience, New York, NY, USA; 2006.MATH
28.
go back to reference Han T: Information-Spectrum Methods in Information Theory. Springer, Berlin, Germany; 2003.CrossRefMATH Han T: Information-Spectrum Methods in Information Theory. Springer, Berlin, Germany; 2003.CrossRefMATH
29.
go back to reference Telatar E: Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications 1999, 10(6):585-595. 10.1002/ett.4460100604CrossRef Telatar E: Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications 1999, 10(6):585-595. 10.1002/ett.4460100604CrossRef
30.
31.
go back to reference Scharf LL: Statistical Signal Processing: Detection, Estimation, and Time Series Analysis. Addison-Wesley, New York, NY, USA; 1990. Scharf LL: Statistical Signal Processing: Detection, Estimation, and Time Series Analysis. Addison-Wesley, New York, NY, USA; 1990.
32.
go back to reference Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.CrossRefMATH Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.CrossRefMATH
33.
go back to reference Marshall A, Olkin I: Inequalities: Theory of Majorization and Its Applications. Academic Press, Boston, Mass, USA; 1979.MATH Marshall A, Olkin I: Inequalities: Theory of Majorization and Its Applications. Academic Press, Boston, Mass, USA; 1979.MATH
34.
go back to reference Harville D: Matrix Algebra from a Statistician's Perspective. Springer, New York, NY, USA; 1997.CrossRefMATH Harville D: Matrix Algebra from a Statistician's Perspective. Springer, New York, NY, USA; 1997.CrossRefMATH
35.
go back to reference Khisti A, Wornell G, Wiesel A, Eldar Y: On the Gaussian MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), June 2007, Nice, France 2471-2475. Khisti A, Wornell G, Wiesel A, Eldar Y: On the Gaussian MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), June 2007, Nice, France 2471-2475.
36.
Metadata
Title
Secret Sharing over Fast-Fading MIMO Wiretap Channels
Authors
Tan F. Wong
Matthieu Bloch
John M. Shea
Publication date
01-12-2009
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2009/506973

Other articles of this Issue 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Go to the issue

Premium Partner