Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01-12-2009 | Research Article

Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding

Authors: Mari Kobayashi, Mérouane Debbah, Shlomo Shamai (Shitz)

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2009

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We study the frequency-selective broadcast channel with confidential messages (BCC) where the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a block transmission of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq1_HTML.gif symbols followed by a guard interval of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq2_HTML.gif symbols, the frequency-selective channel can be modeled as a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq3_HTML.gif Toeplitz matrix. For this special type of multiple-input multiple-output channels, we propose a practical Vandermonde precoding that projects the confidential messages in the null space of the channel seen by receiver 2 while superposing the common message. For this scheme, we provide the achievable rate region and characterize the optimal covariance for some special cases of interest. Interestingly, the proposed scheme can be applied to other multiuser scenarios such as the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq4_HTML.gif -user frequency-selective BCC with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq5_HTML.gif confidential messages and the two-user frequency-selective BCC with two confidential messages. For each scenario, we provide the secrecy degree of freedom (s.d.o.f.) region of the corresponding channel and prove the optimality of the Vandermonde precoding. One of the appealing features of the proposed scheme is that it does not require any specific secrecy encoding technique but can be applied on top of any existing powerful encoding schemes.

1. Introduction

We consider a secured medium such that the transmitter wishes to send a confidential message to its receiver while keeping the eavesdropper, tapping the channel, ignorant of the message. Wyner [1] introduced this model named the wiretap channel to model the degraded broadcast channel where the eavesdropper observes a degraded version of the receiver's signal. In this model, the confidentiality is measured by the equivocation rate, that is, the mutual information between the confidential message and the eavesdropper's observation. For the discrete memoryless degraded wiretap channel, Wyner characterized the capacity-equivocation region and showed that a nonzero secrecy rate can be achieved [1]. The most important operating point on the capacity-equivocation region is the secrecy capacity, that is, the largest reliable communication rate such that the eavesdropper obtains no information about the confidential message (the equivocation rate is as large as the message rate). The secrecy capacity of the Gaussian wiretap channel was given in [2]. Csiszár and Körner considered a more general wiretap channel in which a common message for both receivers is sent in addition to the confidential message [3]. For this model known as the broadcast channel with confidential (BCC) messages, the rate-tuple of the common and confidential messages was characterized.
Recently, a significant effort has been made to opportunistically exploit the space/time/user dimensions for secrecy communications (see, e.g., [414] and references therein). In [4], the secrecy capacity of the ergodic slow fading channels was characterized and the optimal power/rate allocation was derived. The secrecy capacity of the parallel fading channels was given [6, 7] where [7] considered the BCC with a common message. Moreover, the secrecy capacity of the wiretap channel with multiple antennas has been studied in [813, 15] and references therein. In particular, the secrecy capacity of the multiple-input multiple-output (MIMO) wiretap channel has been fully characterized in [5, 11, 12, 14] and more recently its closed-form expressions under a matrix covariance constraint have been derived in [15]. Furthermore, a large number of recent works have considered the secrecy capacity region for more general broadcast channels. In [16], the authors studied the two-user MIMO Gaussian BCC where the capacity region for the case of one common and one confidential message was characterized. The two-user BCC with two confidential messages, each of which must be kept secret to the unintended receiver, has been studied in [1720]. In [18], Liu and Poor characterized the secrecy capacity region for the multiple-input single-output (MISO) Gaussian BCC where the optimality of the secret dirty paper coding (S-DPC) scheme was proved. A recent contribution [19] extended the result to the MIMO Gaussian BCC. The multireceiver wiretap channels have been also studied in [2126] (and reference therein) where the confidential messages to each receiver must be kept secret to an external eavesdropper. It has been proved that the secrecy capacity region of the MIMO Gaussian multireceiver wiretap channels is achieved by S-DPC [24, 26].
However, very few work have exploited the frequency selectivity nature of the channel for secrecy purposes [27] where the zeros of the channel provide an opportunity to "hide" information. This paper shows the opportunities provided by the broad-band channel and studies the frequency-selective BCC where the transmitter sends one confidential message to receiver 1 and one common message to both receivers 1 and 2. The channel state information (CSI) is assumed to be known to both the transmitter and the receivers. We consider the quasistatic frequency-selective fading channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq6_HTML.gif paths such that the channel remains fixed during an entire transmission of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq7_HTML.gif blocks for an arbitrary large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq8_HTML.gif . It should be remarked that in general the secrecy rate cannot scale with signal-to-noise ratio (SNR) over the channel at hand, unless the channel of receiver 2 has a null frequency band of positive Lebesgue measure (on which the transmitter can "hide'' the confidential message). In this contribution, we focus on the realistic case where receiver 2 has a full frequency band (without null subbands) but operates in a reduced dimension due to practical complexity issues. This is typical of current orthogonal frequency division multiplexing (OFDM) standards (such as IEEE802.11a/WiMax or LTE [2830]) where a guard interval of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq9_HTML.gif symbols is inserted at the beginning of each block to avoid the interblock interference and both receivers discard these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq10_HTML.gif symbols. We assume that both users have the same standard receiver, in particular receiver 2 cannot change its hardware structure. Studying secure communications under this assumption is of interest in general and can be justified since receiver 2 is actually a legitimate receiver which can receive a confidential message in other communication periods. Of course, if receiver 2 is able to access the guard interval symbols, it can extract the confidential message and the secrecy rate falls down to zero. Although we restrict ourselves to the reduced dimension constraint in this paper, other constraints on the limited capability at the unintended receiver such as energy consumption or hardware complexity might provide a new paradigm to design physical layer secrecy systems.
In the case of a block transmission of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq11_HTML.gif symbols followed by a guard interval of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq12_HTML.gif symbols discarded at both receivers, the frequency-selective channel can be modeled as an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq13_HTML.gif MIMO Toeplitz matrix. In this contribution, we aim at designing a practical linear precoding scheme that fully exploits the degrees of freedom (d.o.f.) offered by this special type of MIMO channels to transmit both the common message and the confidential message. To this end, let us start with the following remarks. On one hand, the idea of using OFDM modulation to convert the frequency-selective channel represented by the Toeplitz matrix into a set of parallel fading channel turns out to be useless from a secrecy perspective. Indeed, it is known that the secrecy capacity of the parallel wiretap fading channels does not scale with SNR [7]. On the other hand, recent contributions [5, 11, 12, 14, 15] showed that the secrecy capacity of the MIMO wiretap channel grows linearly with SNR, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq14_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq15_HTML.gif denotes the secrecy degree of freedom (s.d.o.f.) (to be specified). In the high SNR regime, the secrecy capacity of the MISO/MIMO wiretap channel is achieved by sending the confidential message in the null space of the eavesdropper's channel [10, 11, 14, 15, 18, 19]. Therefore, OFDM modulation is highly suboptimal in terms of the s.d.o.f.
Inspired by these remarks, we propose a linear Vandermonde precoder that projects the confidential message in the null space of the channel seen by receiver 2 while superposing the common message. Thanks to the orthogonality between the precoder of the confidential message and the channel of receiver 2; receiver 2 obtains no information on the confidential message. This precoder is regarded as a single-antenna frequency beamformer that nulls the signal in certain directions seen by receiver 2. The Vandermonde structure comes from the fact that the frequency beamformer is of the type https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq16_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq17_HTML.gif is one of the roots of the channel seen by receiver 2. Note that Vandermonde matrices [31] have already been considered for cognitive radios [32] and CDMA systems [33] to reduce/null interference but not for secrecy applications. One of the appealing aspects of Vandermonde precoding is that it does not require a specific secrecy encoding technique but can be applied on top of any classical capacity achieving encoding scheme.
For the proposed scheme, we characterize its achievable rate region, the rate-tuple of the common message, the confidential message, respectively. Unfortunately, the optimal input covariances achieving their boundary are generally difficult to compute due to the nonconvexity of the weighted sum rate maximization problem. Nevertheless, we show that there are some special cases of interest such as the secrecy rate and the maximum sum rate point which enable an explicit characterization of the optimal input covariances. In addition, we provide the achievable d.o.f. region of the frequency-selective BCC, reflecting the behavior of the achievable rate region in the high SNR regime, and prove that the Vandermonde precoding achieves this region. More specifically, it enables to simultaneously transmit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq18_HTML.gif streams of the confidential message and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq19_HTML.gif streams of the common message for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq20_HTML.gif simultaneously over a block of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq21_HTML.gif dimensions. Interestingly, the proposed Vandermonde precoding can be applied to multiuser secure communication scenarios: (a) a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq22_HTML.gif -user frequency-selective BCC with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq23_HTML.gif confidential messages and one common message, (b) a two-user frequency-selective BCC with two confidential messages and one common message. For each scenario, we characterize the achievable s.d.o.f. region of the corresponding frequency-selective BCC and show the optimality of the Vandermonde precoding.
The paper is organized as follows. Section 2 presents the frequency-selective fading BCC. Section 3 introduces the Vandermonde precoding and characterizes its achievable rate region as well as the optimal input covariances for some special cases. Section 4 provides the application of the Vandermonde precoding to the multiuser secure communications scenarios. Section 5 shows some numerical examples of the proposed scheme in the various settings, and finally Section 6 concludes the paper.
Notation. In the following, upper (lower boldface) symbols will be used for matrices (column vectors) whereas lower symbols will represent scalar values, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq24_HTML.gif will denote transpose operator, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq25_HTML.gif conjugation, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq26_HTML.gif hermitian transpose. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq27_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq28_HTML.gif represent the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq29_HTML.gif identity matrix, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq30_HTML.gif zero matrix. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq31_HTML.gif denote a determinant, rank, trace of a matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq32_HTML.gif , respectively. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq33_HTML.gif denotes the sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq34_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq35_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq36_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq37_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq38_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq39_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq40_HTML.gif denote the realization of the random variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq41_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq42_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq43_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq44_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq45_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq46_HTML.gif . Finally, " https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq47_HTML.gif '' denotes less or equal to in the positive semidefinite ordering between positive semidefinite matrices, that is, we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq48_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq49_HTML.gif is positive semidefinite.

2. System Model

We consider the quasistatic frequency-selective fading BCC illustrated in Figure 1. The received signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq50_HTML.gif of receivers 1, 2 at block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq51_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq52_HTML.gif denote an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq53_HTML.gif Toeplitz matrix with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq54_HTML.gif -path channel vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq55_HTML.gif of user 1, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq56_HTML.gif of user 2, respectively, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq57_HTML.gif denotes the transmit vector, and finally https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq58_HTML.gif are mutually independent additive white Gaussian noise (AWGN). The input vector is subject to the power constraint given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ2_HTML.gif
(2)
where we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq59_HTML.gif . The structure of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq60_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ3_HTML.gif
(3)
We assume that the channel matrices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq61_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq62_HTML.gif remain constant for the whole duration of the transmission of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq63_HTML.gif blocks and are known to all terminals. At each block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq64_HTML.gif , we transmit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq65_HTML.gif symbols by appending a guard interval of size https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq66_HTML.gif larger than the delay spread, which enables to avoid the interference between neighbor blocks.
The transmitter wishes to send a common message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq67_HTML.gif to two receivers and a confidential message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq68_HTML.gif to receiver 1. A https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq69_HTML.gif code consists of the following: (1) two message sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq70_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq71_HTML.gif with the messages https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq72_HTML.gif uniformly distributed over the sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq73_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq74_HTML.gif , respectively; (2) a stochastic encoder that maps each message pair https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq75_HTML.gif to a codeword https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq76_HTML.gif ; (3) one decoder at receiver 1 that maps a received sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq77_HTML.gif to a message pair https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq78_HTML.gif and another at receiver 2 that maps a received sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq79_HTML.gif to a message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq80_HTML.gif . The average error probability of a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq81_HTML.gif code is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq82_HTML.gif denotes the error probability when the message pair https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq83_HTML.gif is sent defined by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ5_HTML.gif
(5)
The secrecy level of the confidential message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq84_HTML.gif at receiver 2 is measured by the equivocation rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq85_HTML.gif defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ6_HTML.gif
(6)
which is the normalized entropy of the confidential message conditioned on the received signal at receiver 2 and available CSI.
A rate-equivocation tuple https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq86_HTML.gif is said to be achievable if for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq87_HTML.gif there exists a sequence of codes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq88_HTML.gif such that we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ7_HTML.gif
(7)
In this paper, we focus on the perfect secrecy case where receiver 2 obtains no information about the confidential message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq89_HTML.gif , which is equivalent to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq90_HTML.gif . In this setting, an achievable rate region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq91_HTML.gif of the general BCC (expressed in bit per channel use per dimension) is given by [3]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ8_HTML.gif
(8)
where the union is over all possible distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq92_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq93_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq94_HTML.gif satisfying [20, Lemma  1]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ9_HTML.gif
(9)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq95_HTML.gif might be a deterministic function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq96_HTML.gif . Recently, the secrecy capacity region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq97_HTML.gif of the two-user MIMO-BCC (1) was characterized in [16] and is given by all possible rate tuples https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq98_HTML.gif satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ10_HTML.gif
(10)
for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq99_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq100_HTML.gif denotes the input covariance satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq101_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq102_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq103_HTML.gif denotes the channel matrix of receiver 1, 2, respectively. Obviously, when only the confidential message is transmitted to receiver 1, the frequency-selective BCC (1) reduces to the MIMO flat-fading wiretap channel whose secrecy capacity has been characterized in [1012, 14, 15]. In particular, Bustin et al. derived its closed-form expression under a power-covariance constraint [15]. Under a total power (trace) constraint, the secrecy capacity of the MIMO Gaussian wiretap channel is expressed as [19, Theorem  3]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ11_HTML.gif
(11)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq104_HTML.gif are the generalized eigen-values greater than one of the following pencil:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ12_HTML.gif
(12)
(In [15, 19] the authors consider the real matrices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq105_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq106_HTML.gif . Nevertheless, it is conjectured that for complex matrices the following expression without https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq107_HTML.gif in the prelog holds.) As explicitly characterized in [15, Theorem  2], the optimal input covariance achieving the above region is chosen such that the confidential message is sent over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq108_HTML.gif subchannels where receiver 1 observes stronger signals than receiver 2. Moreover, in the high SNR regime the optimal strategy converges to beamforming into the null subspace of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq109_HTML.gif [5, 11, 12, 14] as for the MISO case [14, 18]. In order to characterize the behavior of the secrecy capacity region in the high SNR regime, we define the d.o.f. region as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ13_HTML.gif
(13)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq110_HTML.gif denotes s.d.o.f. which corresponds precisely to the number https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq111_HTML.gif of the generalized eigenvalues greater than one in the high SNR.

3. Vandermonde Precoding

For the frequency-selective BCC specified in Section 2, we wish to design a practical linear precoding scheme which fully exploits the d.o.f. offered by the frequency-selective channel. We remarked previously that for a special case when only the confidential message is sent to receiver 1 (without a common message), the optimal strategy consists of beamforming the confidential signal into the null subspace of receiver 2. By applying this intuitive result to the special Toeplitz MIMO channels https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq112_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq113_HTML.gif while including a common message, we propose a linear precoding strategy named Vandermonde precoding. Prior to the definition of the Vandermonde precoding, we provide some properties of a Vandermonde matrix [31].
Property 1.
Given a full-rank Toeplitz matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq114_HTML.gif , there exists a Vandermonde matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq115_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq116_HTML.gif whose structure is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq117_HTML.gif are the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq118_HTML.gif roots of the polynomial https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq119_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq120_HTML.gif coefficients of the channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq121_HTML.gif . Clearly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq122_HTML.gif satisfies the following orthogonal condition:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ15_HTML.gif
(15)
and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq123_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq124_HTML.gif are all different.
It is well known that as the dimension of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq125_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq126_HTML.gif increases, the Vandermonde matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq127_HTML.gif becomes ill-conditioned unless the roots are on the unit circle. In other words, the elements of each column either grow in energy or tend to zero [31]. Hence, instead of the brut Vandermonde matrix (14), we consider a unitary Vandermonde matrix obtained either by applying the Gram-Schmidt orthogonalization or singular value decomposition (SVD) on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq128_HTML.gif .
Definition 1.
We let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq129_HTML.gif be a unitary Vandermonde matrix obtained by orthogonalizing the columns of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq130_HTML.gif . We let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq131_HTML.gif be a unitary matrix in the null space of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq132_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq133_HTML.gif . The common message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq134_HTML.gif , the confidential message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq135_HTML.gif , is sent along https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq136_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq137_HTML.gif , respectively. We call https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq138_HTML.gif Vandermonde precoder.
Further, the precoding matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq139_HTML.gif for the confidential message satisfies the following property.
Lemma 2.
Given two Toeplitz matrices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq140_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq141_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq142_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq143_HTML.gif are linearly independent, there exists a unitary Vandermonde matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq144_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq145_HTML.gif satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ16_HTML.gif
(16)
Proof.
Appendix A.
In order to send the confidential message intended to receiver 1 as well as the common message to both receivers over the frequency-selective channel (1), we consider the Gaussian superposition coding based on the Vandermonde precoder of Definition 1. Namely, at block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq146_HTML.gif , we form the transmit vector as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ17_HTML.gif
(17)
where the common message vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq147_HTML.gif and the confidential message vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq148_HTML.gif are mutually independent Gaussian vectors with zero mean and covariance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq149_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq150_HTML.gif , respectively. Under this condition, the input covariances subject to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ18_HTML.gif
(18)
satisfy the power constraint (2). We let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq151_HTML.gif denote the feasible set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq152_HTML.gif satisfying (18).
Theorem 3.
The Vandermonde precoding achieves the following secrecy rate region:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq153_HTML.gif denotes the convex hull and we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq154_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq155_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq156_HTML.gif .
Proof.
Due to the orthogonal property (16) of the unitary Vandermonde matrix, receiver 2 only observes the common message, which yields the received signals given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ20_HTML.gif
(20)
where we drop the block index. We examine the achievable rate region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq157_HTML.gif of the Vandermonde precoding. By letting the auxiliary variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq158_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq159_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ21_HTML.gif
(21)
Plugging these expressions to (8), we obtain (19).
The boundary of the achievable rate region of the Vandermonde precoding can be characterized by solving the weighted sum rate maximization. Any point https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq160_HTML.gif on the boundary of the convex region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq161_HTML.gif is obtained by solving
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ22_HTML.gif
(22)
for nonnegative weights https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq162_HTML.gif satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq163_HTML.gif . When the region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq164_HTML.gif , obtained without convex hull, is nonconvex, the set of the optimal covariances https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq165_HTML.gif achieving the boundary point might not be unique. Figure 2 depicts an example in which the achievable rate region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq166_HTML.gif is obtained by the convex hull operation on the region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq167_HTML.gif , that is, replacing the non-convex subregion by the line segment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq168_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq169_HTML.gif . For the weight ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq170_HTML.gif corresponding to the slope of the line segment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq171_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq172_HTML.gif , there exist two optimal sets of the covariances yielding the points https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq173_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq174_HTML.gif (which clearly dominate the point https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq175_HTML.gif ). These points are the solution to the weighted sum rate maximization (22). In summary, an optimal covariance set achieving (22) (might not be unique) is the solution of
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ23_HTML.gif
(23)
where we let
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ24_HTML.gif
(24)
Following [34, Section  II-C] (and also [7, Lemma  2]), we remark that the solution to the max-min problem (23) can be found by hypothesis testing of three cases, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq176_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq177_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq178_HTML.gif . Formally, we have the following lemma.
Lemma 4.
The optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq181_HTML.gif , solution of (23), is given by one of the three solutions.
Case 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq182_HTML.gif maximizes
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ25_HTML.gif
(25)
and satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq183_HTML.gif .
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq184_HTML.gif maximizes
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ26_HTML.gif
(26)
and satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq185_HTML.gif .
Case 3.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq186_HTML.gif maximizes
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ27_HTML.gif
(27)
and satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq187_HTML.gif for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq188_HTML.gif .
Before considering the weighted sum rate maximization (23), one applies SVD to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq189_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq190_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ28_HTML.gif
(28)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq191_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq192_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq193_HTML.gif are unitary, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq194_HTML.gif contain positive singular values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq195_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq196_HTML.gif , respectively. Following [7, Theorem  3], one applies Lemma 4 to solve the weighted sum rate maximization.
Theorem 5.
The set of the optimal covariances https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq197_HTML.gif , achieving the boundary of the achievable rate region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq198_HTML.gif of the Vandermonde precoding, corresponds to one of the following three solutions.
Case 1.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq199_HTML.gif , if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq200_HTML.gif , solution of the following KKT conditions, satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq201_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ29_HTML.gif
(29)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq202_HTML.gif with a positive semidefinite https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq203_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq204_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq205_HTML.gif is determined such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq206_HTML.gif , and we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq207_HTML.gif .
Case 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq208_HTML.gif if the following https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq209_HTML.gif fulfills https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq210_HTML.gif .
We let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq211_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq212_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq213_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq214_HTML.gif are diagonal with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq215_HTML.gif th element given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ30_HTML.gif
(30)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq216_HTML.gif is determined such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq217_HTML.gif .
Case 3.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq218_HTML.gif , if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq219_HTML.gif , solution of the following KKT conditions, satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq220_HTML.gif for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq221_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ31_HTML.gif
(31)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq222_HTML.gif with a positive semidefinite https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq223_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq224_HTML.gif ,  https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq225_HTML.gif is determined such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq226_HTML.gif .
Proof.
Appendix B.
Remark 6.
Due to the non-concavity of the underlying weighted sum rate functions, it is generally difficult to characterize the boundary of the achievable rate region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq227_HTML.gif except for some special cases. The special cases include the corner points, in particular, the secrecy rate for the case of sending only the confidential message ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq228_HTML.gif ), as well as the maximum sum rate point for the equal weight case ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq229_HTML.gif ). It is worth noticing that under equal weight the objective functions in three cases are all concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq230_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq231_HTML.gif since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq232_HTML.gif is concave if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq233_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq234_HTML.gif is concave if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq235_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq236_HTML.gif .
The maximum sum rate point https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq237_HTML.gif can be found by applying the following greedy search [7].
Greedy Search to Find the Maximum Sum Rate Point
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq238_HTML.gif ) Find https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq239_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq240_HTML.gif maximizing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq241_HTML.gif and check https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq242_HTML.gif . If yes stop. Otherwise go to (2).
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq243_HTML.gif ) Find https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq244_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq245_HTML.gif maximizing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq246_HTML.gif and check https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq247_HTML.gif . If yes stop. Otherwise go to (3).
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq248_HTML.gif ) Find https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq249_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq250_HTML.gif maximizing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq251_HTML.gif and check https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq252_HTML.gif for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq253_HTML.gif .
For the special case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq254_HTML.gif , Theorem 5 yields the achievable secrecy rate with the Vandermonde precoding.
Corollary 7.
The Vandermonde precoding achieves the secrecy rate
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ32_HTML.gif
(32)
where the last equality is obtained by applying SVD to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq255_HTML.gif and plugging the power allocation of (30) with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq256_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq257_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq258_HTML.gif is determined such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq259_HTML.gif .
Finally, by focusing the behavior of the achievable rate region in the high SNR regime, we characterize the achievable d.o.f. region of the frequency-selective BCC (1).
Theorem 8.
The d.o.f. region of the frequency-selective BCC (1) with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq260_HTML.gif Toeplitz matrices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq261_HTML.gif is given as a union of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq262_HTML.gif satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ33_HTML.gif
(33)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ34_HTML.gif
(34)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq263_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq264_HTML.gif denote non-negative integers. The Vandermonde precoding achieves the above d.o.f. region.
Proof.
The achievability follows rather trivially by applying Theorem 3. By considering equal power allocation over all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq265_HTML.gif streams such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq266_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq267_HTML.gif , we obtain the rate tuple https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq268_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq269_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ35_HTML.gif
(35)
We first notice that the prelog factor of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq270_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq271_HTML.gif depends only on the rank of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq272_HTML.gif . From Lemma 2, we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ36_HTML.gif
(36)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ37_HTML.gif
(37)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ38_HTML.gif
(38)
where (a) follows from orthogonality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq273_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq274_HTML.gif , (b) follows from the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq275_HTML.gif is unitary satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq276_HTML.gif . Notice that (36) yields https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq277_HTML.gif . For the d.o.f. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq278_HTML.gif of the common message, (36) and (38) yield
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ39_HTML.gif
(39)
which is dominated by the pre-log of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq279_HTML.gif in (37). This establishes the achievability.
The converse follows by noticing that the inequalities (33) and (34) correspond to trivial upper bounds. The first inequality (33) corresponds to the s.d.o.f. of the MIMO wiretap channel with the legitimate channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq280_HTML.gif and the eavesdropper channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq281_HTML.gif , which is bounded by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq282_HTML.gif . The second inequality (34) follows because the total number of streams for receiver 1 cannot be larger than the d.o.f. of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq283_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq284_HTML.gif .
Figure 3 illustrates the region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq285_HTML.gif of the frequency-selective BCC over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq286_HTML.gif dimensions. We notice that the s.d.o.f. constraint (33) yields the line segment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq287_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq288_HTML.gif while the constraint (34) in terms of the total number of streams for receiver 1 yields the line segment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq289_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq290_HTML.gif .

4. Multiuser Secure Communications

In this section, we provide some applications of the Vandermonde precoding in the multi-user secure communication scenarios where the transmitter wishes to send confidential messages to more than one intended receivers. The scenarios that we address are: (a) a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq292_HTML.gif -user frequency-selective BCC with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq293_HTML.gif confidential messages and one common message, (b) a two-user frequency-selective BCC with two confidential messages and one common message. For each scenario, by focusing on the behavior in the high SNR regime, we characterize the achievable s.d.o.f. region and show the optimality of the Vandermonde precoding.

4.1. K + 1-User BCC with K Confidential Messages

As an extension of Section 3, we consider the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq294_HTML.gif -user frequency-selective BCC where the transmitter sends https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq295_HTML.gif confidential messages https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq296_HTML.gif to the first https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq297_HTML.gif receivers as well as one common message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq298_HTML.gif to all receivers. Each of the confidential messages must be kept secret to receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq299_HTML.gif . Notice that this model, called multireceiver wiretap channel, has been studied in the literature ([20, 2226] and reference therein). In particular, the secrecy capacity region of the Gaussian MIMO multireceiver wiretap channel has been characterized in [24, 26] for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq300_HTML.gif , an arbitrary https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq301_HTML.gif , respectively, where the optimality of the S-DPC is proved.
The received signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq302_HTML.gif of receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq303_HTML.gif and the received signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq304_HTML.gif of receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq305_HTML.gif at any block are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ40_HTML.gif
(40)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ41_HTML.gif
(41)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq306_HTML.gif is the transmit vector satisfying the total power constraint and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq307_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq308_HTML.gif are mutually independent AWGN with covariance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq309_HTML.gif . We assume that the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq310_HTML.gif vectors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq311_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq312_HTML.gif of length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq313_HTML.gif are linearly independent and perfectly known to all the terminals. As an extension of the frequency-selective BCC in Section 2, we say that the rate tuple https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq314_HTML.gif is achievable if for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq315_HTML.gif there exists a sequence of codes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq316_HTML.gif such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ42_HTML.gif
(42)
where we denote https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq317_HTML.gif and define
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ43_HTML.gif
(43)
An achievable secrecy rate region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq318_HTML.gif for the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq319_HTML.gif , when the transmitter sends two confidential messages in the presence of an external eavesdropper, is provided in [25, Theorem 1]. This theorem can be extended to an arbitrary https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq320_HTML.gif while including the common message. Formally we state the following lemma.
Lemma 9.
An achievable rate region of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq321_HTML.gif +1-user BCC, where the transmitter sends https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq322_HTML.gif confidential messages intended to the first https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq323_HTML.gif receivers as well as a common message to all users, is given as a union of all non-negative rate-tuple satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ44_HTML.gif
(44)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq324_HTML.gif denotes a permutation over the subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq325_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq326_HTML.gif denotes the cardinality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq327_HTML.gif , we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq328_HTML.gif , and the random variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq329_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq330_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq331_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq332_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq333_HTML.gif satisfy the Markov chain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ45_HTML.gif
(45)
Proof.
Appendix C.
Notice that the second term of the last equation in (44) can be also expressed by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ46_HTML.gif
(46)
It can be easily seen that without the secrecy constraint the above region reduces to the Marton's achievable region for the general https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq334_HTML.gif -user broadcast channel [35].
In order to focus on the behavior of the region in the high SNR regime, we define the s.d.o.f. region as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ47_HTML.gif
(47)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq335_HTML.gif denotes the d.o.f. of the common message and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq336_HTML.gif denotes the s.d.o.f. of confidential message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq337_HTML.gif . As an extension of Theorem 8, we have the following s.d.o.f. region result.
Theorem 10.
The s.d.o.f. region of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq338_HTML.gif -user frequency-selective BCC (40) is a union of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq339_HTML.gif satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ48_HTML.gif
(48)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ49_HTML.gif
(49)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq340_HTML.gif are non-negative integers. The Vandermonde precoding achieves this region.
Proof.
Appendix D.
Figure 4 illustrates the region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq341_HTML.gif for the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq342_HTML.gif confidential messages. It can be easily seen that the constraint (49) in terms of the total number of streams for the virtual receiver yields the subspace https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq343_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq344_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq345_HTML.gif while the s.d.o.f. constraint (48) for the virtual receiver yields the subspace https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq346_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq347_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq348_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq349_HTML.gif . We remark that for the special case of one confidential message and one common message ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq350_HTML.gif ), the region reduces to Figure 3.
Remark 11.
When only the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq353_HTML.gif confidential messages are transmitted to the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq354_HTML.gif intended receivers in the presence of the eavesdropper, the s.d.o.f. region has the equivalent MIMO interpretation [36]. More specifically, the frequency-selective BCC (40) is equivalent to the MIMO-BCC where the transmitter with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq355_HTML.gif dimensions (antennas) sends messages to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq356_HTML.gif receivers with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq357_HTML.gif antennas each in the presence of the eavesdropper with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq358_HTML.gif antennas. The secrecy constraint (orthogonal constraint) consumes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq359_HTML.gif dimensions of the channel seen by the virtual receiver and lets the number of effective transmit antennas be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq360_HTML.gif . The resulting channel is the MIMO-BC without secrecy constraint with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq361_HTML.gif transmit antennas and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq362_HTML.gif receivers with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq363_HTML.gif antennas each, whose multiplexing gain is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq364_HTML.gif (we assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq365_HTML.gif ). Figure 5 illustrates the example with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq366_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq367_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq368_HTML.gif .

4.2. Two-User BCC with Two Confidential Messages

We consider the two-user BCC where the transmitter sends two confidential messages https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq369_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq370_HTML.gif as well as one common message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq371_HTML.gif . Each of the confidential messages must be kept secret to the unintended receiver. This model has been studied in [1719] for the case of two confidential messages and in [20] for the case of two confidential messages and a common message. In [19], the secrecy capacity region of the MIMO Gaussian BCC was characterized. The received signal at receivers 1, 2 at any block is given, respectively, by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ50_HTML.gif
(50)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq372_HTML.gif is the input vector satisfying the total power constraint and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq373_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq374_HTML.gif are mutually independent AWGN with covariance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq375_HTML.gif . We assume the channel vectors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq376_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq377_HTML.gif are linearly independent.
We say that the rate tuple https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq378_HTML.gif is achievable if for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq379_HTML.gif there exists a sequence of codes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq380_HTML.gif such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ51_HTML.gif
(51)
where we define the average error probability as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ52_HTML.gif
(52)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq381_HTML.gif is the output of decoders 1, 2, respectively. A secrecy achievable rate region of the two-user BCC with two confidential messages and a common message is given by [20, Theorem  1]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ53_HTML.gif
(53)
where the random variables satisfy the Markov chain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ54_HTML.gif
(54)
We extend Theorem 8 to the two-user frequency-selective BCC (50) and obtain the following s.d.o.f. result.
Theorem 12.
The s.d.o.f. region of the two-user frequency-selective BCC (50) is a union of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq382_HTML.gif satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ55_HTML.gif
(55)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ56_HTML.gif
(56)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq383_HTML.gif are non-negative integers. The Vandermonde precoding achieves the region.
Proof.
Appendix F.
Figure 6 represents the s.d.o.f. region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq384_HTML.gif over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq385_HTML.gif dimensions of the two-user frequency-selective BCC. The per-receiver s.d.o.f. constraints (55) yield the subspace https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq386_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq387_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq388_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq389_HTML.gif for user 1 and the subspace https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq390_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq391_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq392_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq393_HTML.gif for user 2. The constraints (56) in terms of the total number of streams per receiver yield the subregion https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq394_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq395_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq396_HTML.gif for user 1 and the subregion https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq397_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq398_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq399_HTML.gif for user 2. For the special case of one confidential message and one common message, the region reduces to Figure 3.
Remark 13.
Comparing Theorems 10, 12 as well as Figures 4, 6 for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq403_HTML.gif , it clearly appears that the s.d.o.f. of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq404_HTML.gif -user BCC with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq405_HTML.gif confidential messages is dominated by the s.d.o.f. of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq406_HTML.gif -user BCC with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq407_HTML.gif confidential messages. In other words, the s.d.o.f. region critically depends on the assumption on the eavesdropper(s) to whom each confidential message must be kept secret.
Remark 14.
When only two confidential messages are transmitted in the two-user frequency-selective BCC, the set of the s.d.o.f. has the equivalent MIMO interpretation [36]. More specifically, the frequency-selective BCC (40) is equivalent to the MIMO-BCC where the transmitter with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq408_HTML.gif dimensions (antennas) sends two confidential messages to two receivers with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq409_HTML.gif antennas. The secrecy constraint consumes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq410_HTML.gif dimensions for each MIMO link and lets the number of effective transmit antennas be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq411_HTML.gif for each user. The resulting channel is a two parallel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq412_HTML.gif point-to-point MIMO channel without eavesdropper. Notice that the same parallel MIMO links can be obtained by applying the block diagonalization on the MIMO-BC without secrecy constraint [36]. In other words, the secrecy constraint in the BCC with inner eavesdroppers is equivalent to the orthogonal constraint in the classical MIMO-BC. Figure 7 shows the example with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq413_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq414_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq415_HTML.gif confidential messages.

5. Numerical Examples

In order to examine the performance of the proposed Vandermonde precoding, this section provides some numerical results in different settings.

5.1. Secrecy Rate versus SNR

We evaluate the achievable secrecy rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq416_HTML.gif in (32) when the transmitter sends only a confidential message to receiver 1 (without a common message) in the presence of receiver 2 (eavesdropper) over the frequency-selective BCC studied in Section 3.

5.1.1. MISO Wiretap Channel

For the sake of comparison (albeit unrealistic), we consider the special case of the frequency-selective wiretap channel when receiver 1 has a scalar observation and the eavesdropper has https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq417_HTML.gif observations. This is equivalent to the MISO wiretap channel with the receiver 1 channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq418_HTML.gif and the eavesdropper channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq419_HTML.gif . Without loss of generality, we assume that the observation at receiver 1 is the first row of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq420_HTML.gif . We consider that all entries of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq421_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq422_HTML.gif are i.i.d. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq423_HTML.gif and average the secrecy rate over a large number of randomly generated channels with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq424_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq425_HTML.gif . In Figure 8, we compare the optimal beamforming strategy [10, 13, 14] and the Vandermonde precoding as a function of SNR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq426_HTML.gif . Since only one stream is sent to receiver 1, the s.d.o.f. is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq427_HTML.gif . In fact, the MISO secrecy capacity in the high SNR regime is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ57_HTML.gif
(57)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq428_HTML.gif is the beamforming vector. The Vandermonde precoding achieves
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ58_HTML.gif
(58)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq429_HTML.gif denotes the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq430_HTML.gif th column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq431_HTML.gif orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq432_HTML.gif . Clearly, there exists a constant gap between (57) and (58) due to the suboptimal choice of the beamforming vector.

5.1.2. MIMO Wiretap Channel

We consider the frequency-selective wiretap channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq435_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq436_HTML.gif . Although there exists a closed-form expression under a power-covariance constraint [15], the secrecy capacity under a total power constraint in (11) is still difficult to compute (especially for a large dimension of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq437_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq438_HTML.gif ) because it requires a search over all possible power covariances constraints. Therefore, in Figure 9, we compare the averaged secrecy rate achieved by the generalized SVD scheme [5] and the Vandermonde precoding. We assume that all entries of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq439_HTML.gif are i.i.d. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq440_HTML.gif . For the Vandermonde precoding, we show the achievable rate with waterfilling power allocation (32) and equal power allocation (36) by allocating https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq441_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq442_HTML.gif streams. As observed, these two suboptimal schemes achieve the same s.d.o.f. of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq443_HTML.gif although the generalized SVD incurs a substantial power loss. The result agrees well with Theorem 8. We remark also that the optimal waterfilling power allocation yields a negligible gain.

5.2. The Maximum Sum Rate Point (R0, R1) versus SNR

We consider the frequency-selective BCC with one confidential message to receiver 1 and one common message to two receivers. In particular, we characterize the maximum sum rate-tuple corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq446_HTML.gif on the boundary of the achievable rate region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq447_HTML.gif . Figure 10 shows the averaged maximum sum rate-tuple https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq448_HTML.gif of the Vandermonde precoding both with optimal input covariance computed by the greedy algorithm and with equal power allocation. We remark that there is essentially no loss with the equal power allocation.

5.3. Two-User Secrecy Rate Region in the Frequency-Selective BCC

We consider the two-user frequency-selective BCC where the transmitter sends two confidential messages (no common message) of Section 4.2. For the sake of comparison (albeit unrealistic), we consider the special case of one observation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq450_HTML.gif at each receiver. Notice that the two-user frequency-selective BCC is equivalent to the two-user MISO BCC with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq451_HTML.gif whose secrecy capacity region is achieved by the S-DPC scheme [18]. The proposed Vandermonde precoding achieves the secrecy rate region given by all possible rate-tuples https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq452_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ59_HTML.gif
(59)
satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq453_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq454_HTML.gif denotes the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq455_HTML.gif th column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq456_HTML.gif orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq457_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq458_HTML.gif orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq459_HTML.gif , respectively. Figure 11 compares the averaged secrecy rate region of the Vandermonde precoding, zero-forcing beamforming, and the optimal S-DPC scheme for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq460_HTML.gif where all entries of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq461_HTML.gif are i.i.d. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq462_HTML.gif . As observed, the Vandermonde precoding achieves the near-optimal rate region. As the number of paths https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq463_HTML.gif increases, the gap with respect to the S-DPC becomes smaller since the Vandermonde precoding tends to choose the optimal beamformer matched to the channels.

6. Conclusions

We considered the secured communication over the frequency-selective channel by focusing on the frequency-selective BCC. In the case of a block transmission of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq465_HTML.gif symbols followed by a guard interval of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq466_HTML.gif symbols discarded at both receivers, the frequency-selective channel can be modeled as an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq467_HTML.gif Toeplitz matrix. For this special type of MIMO channels, we proposed a practical yet order-optimal Vandermonde precoding which enables to send https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq468_HTML.gif streams of the confidential messages and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq469_HTML.gif streams of the common messages simultaneously over a block of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq470_HTML.gif dimensions. The key idea here consists of exploiting the frequency dimension to "hide" confidential information in the zeros of the channel seen by the unintended receiver similarly to the spatial beamforming. We also provided some application of the Vandermonde precoding in the multiuser secured communication scenarios and proved the optimality of the proposed scheme in terms of the achievable s.d.o.f. region.
We conclude this paper by noticing that there exists a simple approach to establish secured communications. More specifically, perfect secrecy can be built in two separated blocks: (1) a precoding that cancels the channel seen by the eavesdropper to fulfill the equivocation requirement, (2) the powerful off-the-shelf encoding techniques to achieve the secrecy rate. Since the practical implementation of secrecy encoding techniques (double binning) remains a formidable challenge, such design is of great interest for the future secrecy systems.

Acknowledgments

The work is supported by the European Commission in the framework of the FP7 Network of Excellence in Wireless COMmunications NEWCOM++. The work of M. Debbah is supported by Alcatel-Lucent within the Alcatel-Lucent Chair on Flexible Radio at Supelec. The authors wish to thank Yingbin Liang for helpful discussions, and the anonymous reviewers for constructive comments. The material in this paper was partially presented at IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France, September 2008.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Appendix

Appendices

A. Proof of Lemma 2

In this appendix, we consider the rank of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq471_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq472_HTML.gif satisfies the orthogonality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq473_HTML.gif . By letting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq474_HTML.gif denote the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq475_HTML.gif th column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq476_HTML.gif we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq477_HTML.gif for the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq478_HTML.gif . We define the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq479_HTML.gif orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq480_HTML.gif by appending https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq481_HTML.gif rows https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq482_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq483_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ60_HTML.gif
(A1)
Notice that all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq484_HTML.gif rows are linearly independent. By definition of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq485_HTML.gif , it is not difficult to see that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq486_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq487_HTML.gif form a complete set of basis for an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq488_HTML.gif -dimensional linear space. Indeed for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq489_HTML.gif the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq490_HTML.gif reduces to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq491_HTML.gif , while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq492_HTML.gif , a subset of a projection matrix onto the null space of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq493_HTML.gif is appended to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq494_HTML.gif . Hence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq495_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ61_HTML.gif
(A2)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq496_HTML.gif is the projection of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq497_HTML.gif onto the row vectors of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq498_HTML.gif with an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq499_HTML.gif coefficient matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq500_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq501_HTML.gif is the projection of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq502_HTML.gif onto the row vectors of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq503_HTML.gif with an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq504_HTML.gif coefficient matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq505_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ62_HTML.gif
(A3)
where (a) follows from the orthogonality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq506_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq507_HTML.gif , (b) follows from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq508_HTML.gif . The equality (c) is obtained as follows. We notice
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ63_HTML.gif
(A4)
where in (d) adding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq509_HTML.gif does not change the rank, (e) follows because any set of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq510_HTML.gif rows taken from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq511_HTML.gif is linearly independent (from the assumption that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq512_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq513_HTML.gif are linearly independent). Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq514_HTML.gif is orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq515_HTML.gif , (A.4) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ64_HTML.gif
(A5)
which establishes (c).

B. Proof of Theorem 5

We consider the following three cases given in Lemma 4.
Case 1.
Supposing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq516_HTML.gif , we consider the objective function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq517_HTML.gif in (25). The objective is concave only when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq518_HTML.gif . Nevertheless, we consider the KKT conditions which are necessary for the optimality. It can be easily shown that the KKT conditions are given by (29) where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq519_HTML.gif is the Lagrangian dual matrix associated to the positive semidefiniteness constraint of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq520_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq521_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq522_HTML.gif is the Lagrangian dual variable associated to the total power constraint. It clearly appears that for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq523_HTML.gif the objective is concave in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq524_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq525_HTML.gif and the problem at hand is convex. In this case, any convex optimization algorithm, the gradient-based algorithm [37] for example, can be applied to find the optimal solution while the algorithm converges to a local optimal solution for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq526_HTML.gif .
Case 2.
Supposing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq527_HTML.gif , we consider the objective function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq528_HTML.gif in (26). Since the problem is convex ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq529_HTML.gif is concave and the constraint is linear in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq530_HTML.gif ), the KKT conditions are necessary and sufficient for optimality. We form the Lagrangian and obtain the following KKT conditions:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ65_HTML.gif
(B1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq531_HTML.gif is the Lagrangian dual matrix associated to the positive semidefiniteness constraint of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq532_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq533_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq534_HTML.gif is the Lagrangian dual variable associated to the total power constraint. By creating https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq535_HTML.gif parallel channels via SVD on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq536_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq537_HTML.gif in (28), we readily obtain the solution (30).
Case 3.
For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq538_HTML.gif , we consider the objective function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq539_HTML.gif in (27). In the following we focus on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq540_HTML.gif . Notice that if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq541_HTML.gif we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq542_HTML.gif which yields the corner point https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq543_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq544_HTML.gif denotes the secrecy rate characterized in (32). The KKT conditions, necessary for the optimality, are given by (31) where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq545_HTML.gif is the Lagrangian dual matrix associated to the positive semidefiniteness constraints for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq546_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq547_HTML.gif is the Lagrangian dual variable associated to the total power constraint. The gradient-based algorithm [37] can be applied to find the solution satisfying these KKT conditions. Although this algorithm yields the optimal and unique solution for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq548_HTML.gif , the algorithm converges to a local optimal solution for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq549_HTML.gif .

C. Proof of Lemma 9

In the following, we provide the encoding/decoding scheme to achieve a vertex point within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq550_HTML.gif corresponding to a specific encoding order https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq551_HTML.gif . Our proof builds on the successive Gel'fand-Pinsker coding [38] and random binning for ensuring the perfect secrecy. The overall region https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq552_HTML.gif is obtained by taking the union over all possible https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq553_HTML.gif encoding orders followed by the convex hull operation. We extensively use the notation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq554_HTML.gif to denote a set of jointly typical sequences https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq555_HTML.gif of length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq556_HTML.gif with respect to the distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq557_HTML.gif . We let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq558_HTML.gif arbitrary small for a large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq559_HTML.gif .
(a) Codebook Generation
Fix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq560_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq561_HTML.gif . We define for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq562_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ66_HTML.gif
(C1)
and we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq563_HTML.gif . the joint distribution factors as The stochastic encoder randomly generates
(i)
i.i.d. codewords https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq564_HTML.gif according https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq565_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq566_HTML.gif .
 
(ii)
For user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq567_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq568_HTML.gif i.i.d. codewords https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq569_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq570_HTML.gif , where the indices are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ67_HTML.gif
(C2)
 
(iii)
For user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq571_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq572_HTML.gif i.i.d. codewords https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq573_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq574_HTML.gif , where the indices are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ68_HTML.gif
(C3)
 
(b) Encoding
To send the messages https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq575_HTML.gif , we first choose randomly the index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq576_HTML.gif and the corresponding codeword https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq577_HTML.gif . Given the common message https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq578_HTML.gif , we choose randomly the codeword https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq579_HTML.gif within the bin https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq580_HTML.gif , that is, the index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq581_HTML.gif , such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq582_HTML.gif . Then successively choose the codeword https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq583_HTML.gif , that is, the indices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq584_HTML.gif , such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ69_HTML.gif
(C4)
If there are more than one such sequence, it randomly selects one. Finally the encoder selects according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq585_HTML.gif .
(c) Decoding
The received signals at the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq586_HTML.gif legitimate receivers are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq587_HTML.gif , the outputs of the channels https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq588_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq589_HTML.gif . Receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq590_HTML.gif chooses https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq591_HTML.gif so that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ70_HTML.gif
(C5)
if such pair https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq592_HTML.gif exists and unique. Otherwise it declares an error.
(d) Error Probability Analysis
Without loss of generality, we assume that the message set is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq593_HTML.gif . We remark that an error is declared if one or more of the following events occur.
(i)
Encoding fails
 
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ71_HTML.gif
(C6)
From the construction of the codebook above, we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq594_HTML.gif .
(ii)
Decoding step 1 fails; there does not exist a jointly typical sequence for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq595_HTML.gif , that is,
 
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ72_HTML.gif
(C7)
From joint typicality [39] we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq596_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq597_HTML.gif .
(iii)
Decoding step 2 fails; there exits other sequences satisfying the joint typicality for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq598_HTML.gif
 
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ73_HTML.gif
(C8)
It can be shown that we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq599_HTML.gif if
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ74_HTML.gif
(C9)
for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq600_HTML.gif . Hence, the error probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq601_HTML.gif if the rate-tuple satisfies (44).
(e) Equivocation Calculation
To prove the equivocation requirement
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ75_HTML.gif
(C10)
where we denote https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq602_HTML.gif , we remark that it is sufficient to verify the above inequality for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq603_HTML.gif due to [24, Lemma 1]. Hence, we check whether the the sum rate secrecy constraint is satisfied by the proposed encoding strategy.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ76_HTML.gif
(C11)
where (a) follows because the conditioning decrease the entropy, (b) follows from Fano's inequality [39] stating that for a sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq604_HTML.gif we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ77_HTML.gif
(C12)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq605_HTML.gif denotes the eavesdropper's error probability when decoding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq606_HTML.gif with the knowledge on the message indices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq607_HTML.gif . We have that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq608_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq609_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq610_HTML.gif . (c) follows from the Markov chain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq611_HTML.gif , (d) follows by ignoring a nonnegative term https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq612_HTML.gif , (e) follows because https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq613_HTML.gif for any permutation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq614_HTML.gif over the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq615_HTML.gif , (f) follows because https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq616_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq617_HTML.gif , finally (g) follows because the successive encoder yields the sum rate given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ78_HTML.gif
(C13)
This establishes the achievability.

D. Proof of Theorem 10

The achievability follows by extending Theorem 8 to the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq618_HTML.gif confidential messages. First we remark that as a straightforward extension of Lemma 2 the following lemma holds.
Lemma D.15.
For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq619_HTML.gif , there exists a matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq620_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq621_HTML.gif orthonormal columns with size https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq622_HTML.gif satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ79_HTML.gif
(D1)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ80_HTML.gif
(D2)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq623_HTML.gif denotes the number of columns of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq624_HTML.gif
A sketch of proof is given in Appendix E.
We let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq625_HTML.gif be unitary matrix with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq626_HTML.gif orthonormal columns in the null space of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq627_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq628_HTML.gif . In other words, the Vandermonde precoder https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq629_HTML.gif is a squared unitary matrix satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq630_HTML.gif . Based on the Vandermonde precoder https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq631_HTML.gif , we construct the transmit vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq632_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ81_HTML.gif
(D3)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq633_HTML.gif are mutually independent Gaussian vectors with zero mean and covariance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq634_HTML.gif satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq635_HTML.gif . From the orthogonality properties (D.1), the received signals become
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ82_HTML.gif
(D4)
where receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq636_HTML.gif observes the common message, the intended confidential message, and the interference from other users, while receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq637_HTML.gif observes only the common message. By letting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq638_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq639_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq640_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq641_HTML.gif and considering the equal power allocation to all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq642_HTML.gif streams, we readily obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ83_HTML.gif
(D5)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ84_HTML.gif
(D6)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ85_HTML.gif
(D7)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ86_HTML.gif
(D8)
and we also have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq643_HTML.gif from the independency between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq644_HTML.gif conditioned on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq645_HTML.gif . Plugging this together with (D.7) and (D.8) into (44), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ87_HTML.gif
(D9)
In order to find the d.o.f. region, we notice
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ88_HTML.gif
(D10)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ89_HTML.gif
(D11)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ90_HTML.gif
(D12)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ91_HTML.gif
(D13)
where (a) follows from orthogonality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq646_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq647_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq648_HTML.gif , (b) follows from the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq649_HTML.gif is unitary satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq650_HTML.gif , and (c) follows from Lemma D.15. From (D.11) and (D.12), we readily obtain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq651_HTML.gif , which is dominated by (D.10). Combining (D.12) and (D.13), we obtain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq652_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq653_HTML.gif . This completes the achievability.
The converse follows by a natural extension of Theorem 8 to the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq654_HTML.gif -user BCC. To obtain the constraint (48), we consider that the first https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq655_HTML.gif receivers perfectly cooperate to decode the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq656_HTML.gif confidential messages and one common message. By treating these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq657_HTML.gif receivers as a virtual receiver with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq658_HTML.gif antennas, we immediately obtain the bound (48) corresponding to the s.d.o.f. of the MIMO wiretap channel with the virtual receiver channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq659_HTML.gif and the eavesdropper channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq660_HTML.gif . The bound (49) is obtained by noticing that the total number of streams that receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq661_HTML.gif can decode is limited by the d.o.f. of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq662_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq663_HTML.gif . Namely, we have the following https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq664_HTML.gif inequalities:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ92_HTML.gif
(D14)
which yields https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq665_HTML.gif . Further by letting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq666_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq667_HTML.gif and and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq668_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq669_HTML.gif , we obtain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq670_HTML.gif . Adding the last inequality and (48), we obtain (49). This establishes the converse.

E. Proof of Lemma D.15

We consider https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq671_HTML.gif for a subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq672_HTML.gif . First we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq673_HTML.gif denote https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq674_HTML.gif orthonormal columns that form a unitary Vandermonde matrix orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq675_HTML.gif . For any subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq676_HTML.gif , we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq677_HTML.gif be the unitary matrix formed by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq678_HTML.gif columns corresponding to the subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq679_HTML.gif taken from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq680_HTML.gif . Since a unitary matrix formed by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq681_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq682_HTML.gif can be expressed equivalently as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq683_HTML.gif , we consider https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq684_HTML.gif . For a given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq685_HTML.gif , we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq686_HTML.gif denote a unitary matrix composed by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq687_HTML.gif columns corresponding to the complementary set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq688_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq689_HTML.gif . In order to derive the rank, we follow the same approach as Appendix A. We define the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq690_HTML.gif orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq691_HTML.gif by appending https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq692_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq693_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ93_HTML.gif
(E1)
where the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq694_HTML.gif rows are linearly independent. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq695_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq696_HTML.gif form a complete set of an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq697_HTML.gif -dimensional linear space, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq698_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ94_HTML.gif
(E2)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq699_HTML.gif is a coefficient matrix with dimension https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq700_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq701_HTML.gif respectively. By recalling that any set of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq702_HTML.gif rows taken from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq703_HTML.gif is linearly independent for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq704_HTML.gif (from the assumption that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq705_HTML.gif are linearly independent), we can repeat the same argument as Appendix A and obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ95_HTML.gif
(E3)
which yields the result.

F. Proof of Theorem 12

The achievability follows by generalizing Theorem 8 for the case of two confidential messages. We remark that by symmetry Lemma 2 for one beamforming matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq706_HTML.gif can be trivially extended to two beamforming matrices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq707_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq708_HTML.gif . Namely, we have
Lemma F.16.
For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq709_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq710_HTML.gif , there exists https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq711_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq712_HTML.gif orthnormal columns for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq713_HTML.gif satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ96_HTML.gif
(F1)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ97_HTML.gif
(F2)
Further, we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq714_HTML.gif be a unitary matrix with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq715_HTML.gif orthonormal columns in the null space of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq716_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq717_HTML.gif . We construct https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq718_HTML.gif by Gaussian superposition coding based on the Vandermonde precoder https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq719_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq720_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq721_HTML.gif . From (F.1), each user observes the vector of its confidential message and that of the common message, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ98_HTML.gif
(F3)
By letting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq722_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq723_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq724_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq725_HTML.gif and considering equal power allocation to all streams with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq726_HTML.gif , we readily obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ99_HTML.gif
(F4)
We remark
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_Equ100_HTML.gif
(F5)
where (a) follows from orthogonality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq727_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq728_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq729_HTML.gif , (b) follows because https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq730_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq731_HTML.gif spans a complete https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq732_HTML.gif -dimensional space. These equations yield https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq733_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq734_HTML.gif . This establishes the achievability.
The converse follows by noticing that the constraints (55) and (56) correspond to trivial upper bounds. To obtain (55), we consider the special case when the transmitter sends only one confidential message to one of two receivers in the presence of the eavesdropper. When sending one confidential message to receiver 1, the two-user frequency-selective BCC reduces to the MIMO wiretap channel with the legitimate channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq735_HTML.gif and the eavesdropper channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq736_HTML.gif , whose s.d.o.f. is upper bounded by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq737_HTML.gif . The same bound holds for receiver 2 when transmitting one confidential message to receiver 2 in the presence the eavesdropper (receiver 1). The upper bounds (56) follow because the total number of streams per receiver is limited by the individual https://static-content.springer.com/image/art%3A10.1155%2F2009%2F386547/MediaObjects/13638_2009_Article_1653_IEq738_HTML.gif MIMO link. This establishes the converse.
Literature
1.
go back to reference Wyner AD: The wiretap channel. Bell System Technical Journal 1975., 54: Wyner AD: The wiretap channel. Bell System Technical Journal 1975., 54:
2.
go back to reference Leung-Yan-Cheong SK, Hellman ME: The Gaussian wire-tap channel. IEEE Transactions on Information Theory 1978, 24(4):451-456. 10.1109/TIT.1978.1055917MATHMathSciNetCrossRef Leung-Yan-Cheong SK, Hellman ME: The Gaussian wire-tap channel. IEEE Transactions on Information Theory 1978, 24(4):451-456. 10.1109/TIT.1978.1055917MATHMathSciNetCrossRef
3.
go back to reference Csiszár I, Körner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892MATHCrossRef Csiszár I, Körner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892MATHCrossRef
4.
go back to reference Gopala PK, Lai L, El Gamal H: On the secrecy capacity of fading channels. IEEE Transactions on Information Theory 2008, 54(10):4687-4698.MATHMathSciNetCrossRef Gopala PK, Lai L, El Gamal H: On the secrecy capacity of fading channels. IEEE Transactions on Information Theory 2008, 54(10):4687-4698.MATHMathSciNetCrossRef
5.
go back to reference Khisti A, Wornell G: The MIMOME channel. Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, 2007 Khisti A, Wornell G: The MIMOME channel. Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, 2007
6.
go back to reference Liu T, Prabhakaran V, Vishwanath S: The secrecy capacity of a class of parallel Gaussian compound wiretap channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '08), 2008, Toronto, Canada 116-120. Liu T, Prabhakaran V, Vishwanath S: The secrecy capacity of a class of parallel Gaussian compound wiretap channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '08), 2008, Toronto, Canada 116-120.
7.
go back to reference Liang Y, Poor HV, Shamai S: Secure communication over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2470-2492.MATHMathSciNetCrossRef Liang Y, Poor HV, Shamai S: Secure communication over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2470-2492.MATHMathSciNetCrossRef
8.
go back to reference Goel S, Negi R: Secret communication in presence of colluding eavesdroppers. Proceedings of the 62nd IEEE Vehicular Technology Conference (VTC '05), 2005, Atlantic City, NJ, USA 3: Goel S, Negi R: Secret communication in presence of colluding eavesdroppers. Proceedings of the 62nd IEEE Vehicular Technology Conference (VTC '05), 2005, Atlantic City, NJ, USA 3:
9.
go back to reference Parada P, Blahut R: Secrecy capacity of SIMO and slow fading channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '05), 2005 2152-2155. Parada P, Blahut R: Secrecy capacity of SIMO and slow fading channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '05), 2005 2152-2155.
10.
go back to reference Khisti A, Wornell G: Secure transmission with multiple antennas: the MISOME wiretap channel. submitted to IEEE Transactions on Information Theory, 2007 Khisti A, Wornell G: Secure transmission with multiple antennas: the MISOME wiretap channel. submitted to IEEE Transactions on Information Theory, 2007
11.
go back to reference Liu T, Shamai S: A note on the secrecy capacity of the multi-antenna wiretap channel. submitted to IEEE Transactions on Information Theory, 2007 Liu T, Shamai S: A note on the secrecy capacity of the multi-antenna wiretap channel. submitted to IEEE Transactions on Information Theory, 2007
12.
go back to reference Oggier F, Hassibi B: The secrecy capacity of the MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '08), 2008, Toronto, Canada 524-528. Oggier F, Hassibi B: The secrecy capacity of the MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '08), 2008, Toronto, Canada 524-528.
13.
go back to reference Shafiee S, Ulukus S: Achievable rates in Gaussian MISO channels with secrecy constraints. Proceedings of the IEEE International Symposium on Information Theory, 2007 2466-2470. Shafiee S, Ulukus S: Achievable rates in Gaussian MISO channels with secrecy constraints. Proceedings of the IEEE International Symposium on Information Theory, 2007 2466-2470.
14.
go back to reference Khisti A, Wornell G, Wiesel A, Eldar Y: On the Gaussian MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), 2007, Nice, France 2471-2475. Khisti A, Wornell G, Wiesel A, Eldar Y: On the Gaussian MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), 2007, Nice, France 2471-2475.
15.
go back to reference Bustin R, Liu R, Poor HV, Shamai (Shitz) S: An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. EURASIP Journal on Wireless Communications and Networking. In press Bustin R, Liu R, Poor HV, Shamai (Shitz) S: An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. EURASIP Journal on Wireless Communications and Networking. In press
16.
go back to reference Ly HD, Liu T, Liang Y: MIMO broadcasting with common, private, and confidential messages. Proceedings of the International symposium on Information Theory and Its Applications (ISITA '08), December 2008, Auckland, New Zealand Ly HD, Liu T, Liang Y: MIMO broadcasting with common, private, and confidential messages. Proceedings of the International symposium on Information Theory and Its Applications (ISITA '08), December 2008, Auckland, New Zealand
17.
go back to reference Liu R, Maric I, Spasojevic P, Yates RD: Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions. IEEE Transactions on Information Theory 2008, 54(6):2493-2507.MATHMathSciNetCrossRef Liu R, Maric I, Spasojevic P, Yates RD: Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions. IEEE Transactions on Information Theory 2008, 54(6):2493-2507.MATHMathSciNetCrossRef
18.
go back to reference Liu R, Poor HV: Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages. IEEE Transactions on Information Theory 2009, 55(3):1235-1249.MathSciNetCrossRef Liu R, Poor HV: Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages. IEEE Transactions on Information Theory 2009, 55(3):1235-1249.MathSciNetCrossRef
19.
go back to reference Liu R, Liu T, Poor HV, Shamai (Shitz) S: MIMO Gaussian broadcast channels with confidential messages. Proceedings of the IEEE Symposium on Information Theory (ISIT '09), June-July 2009, Seoul, Korea Liu R, Liu T, Poor HV, Shamai (Shitz) S: MIMO Gaussian broadcast channels with confidential messages. Proceedings of the IEEE Symposium on Information Theory (ISIT '09), June-July 2009, Seoul, Korea
20.
go back to reference Choo LC, Wong KK: The K-receiver broadcast channel with confidential messages. Proceedings of the IEEE International Symposium on Information Theory (ISIT '09), 2009, Seoul, Korea Choo LC, Wong KK: The K-receiver broadcast channel with confidential messages. Proceedings of the IEEE International Symposium on Information Theory (ISIT '09), 2009, Seoul, Korea
21.
go back to reference Khisti A, Tchamkerten A, Wornell GW: Secure broadcasting over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2453-2469.MATHMathSciNetCrossRef Khisti A, Tchamkerten A, Wornell GW: Secure broadcasting over fading channels. IEEE Transactions on Information Theory 2008, 54(6):2453-2469.MATHMathSciNetCrossRef
22.
go back to reference Choo LC, Wong KK: The three-receiver broadcast channel with degraded message sets and confidential messages. submitted to IEEE Transactions on Information Theory Choo LC, Wong KK: The three-receiver broadcast channel with degraded message sets and confidential messages. submitted to IEEE Transactions on Information Theory
23.
go back to reference Ekrem E, Ulukus S: Secrecy capacity of a class of broadcast channels with an eavesdropper. submitted to EURASIP Journal on Wireless Communications and Networking Ekrem E, Ulukus S: Secrecy capacity of a class of broadcast channels with an eavesdropper. submitted to EURASIP Journal on Wireless Communications and Networking
24.
go back to reference Ekrem E, Ulukus S: The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel. submitted to IEEE Transactions on Information Theory Ekrem E, Ulukus S: The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel. submitted to IEEE Transactions on Information Theory
31.
go back to reference Ryan Ø, Debbah M: Asymptotic behaviour of random vandermonde matrices with entries on the unit circle. IEEE Transactions on Information Theory 2009., 55(7): Ryan Ø, Debbah M: Asymptotic behaviour of random vandermonde matrices with entries on the unit circle. IEEE Transactions on Information Theory 2009., 55(7):
32.
go back to reference Cardoso LS, Kobayashi M, Ryan Ø, Debbah M: Vandermonde frequency division multiplexing for cognitive radio. Proceedings of the 9th IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC '08), 2008, Recife, Brazil 421-425. Cardoso LS, Kobayashi M, Ryan Ø, Debbah M: Vandermonde frequency division multiplexing for cognitive radio. Proceedings of the 9th IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC '08), 2008, Recife, Brazil 421-425.
33.
go back to reference Scaglione A, Giannakis GB, Barbarossa S: Lagrange/Vandermonde MUI eliminating user codes forquasi-synchronous CDMA in unknown multipath. IEEE Transactions on Signal Processing 2000, 48(7):2057-2073. 10.1109/78.847790CrossRef Scaglione A, Giannakis GB, Barbarossa S: Lagrange/Vandermonde MUI eliminating user codes forquasi-synchronous CDMA in unknown multipath. IEEE Transactions on Signal Processing 2000, 48(7):2057-2073. 10.1109/78.847790CrossRef
34.
go back to reference Poor HV: An Introduction to Signal Detection and Estimation. Springer, New York, NY, USA; 1994.MATHCrossRef Poor HV: An Introduction to Signal Detection and Estimation. Springer, New York, NY, USA; 1994.MATHCrossRef
35.
go back to reference Viswanath P, Tse DNC: Sum capacity of the vector Gaussian broadcast channel and uplink-downlink duality. IEEE Transactions on Information Theory 2003, 49(8):1912-1921. 10.1109/TIT.2003.814483MATHMathSciNetCrossRef Viswanath P, Tse DNC: Sum capacity of the vector Gaussian broadcast channel and uplink-downlink duality. IEEE Transactions on Information Theory 2003, 49(8):1912-1921. 10.1109/TIT.2003.814483MATHMathSciNetCrossRef
36.
go back to reference Lee J, Jindal N: High SNR analysis for MIMO broadcast channels: dirty paper coding versus linear precoding. IEEE Transactions on Information Theory 2007, 53(12):4787-4792.MathSciNetCrossRef Lee J, Jindal N: High SNR analysis for MIMO broadcast channels: dirty paper coding versus linear precoding. IEEE Transactions on Information Theory 2007, 53(12):4787-4792.MathSciNetCrossRef
37.
go back to reference Viswanathan H, Venkatesan S, Huang H: Downlink capacity evaluation of cellular networks with known-interference cancellation. IEEE Journal on Selected Areas in Communications 2003, 21(5):802-811. 10.1109/JSAC.2003.810346CrossRef Viswanathan H, Venkatesan S, Huang H: Downlink capacity evaluation of cellular networks with known-interference cancellation. IEEE Journal on Selected Areas in Communications 2003, 21(5):802-811. 10.1109/JSAC.2003.810346CrossRef
38.
go back to reference Zhang X, Chen J, Wicker SB, Berger T: Successive coding in multiuser information theory. IEEE Transactions on Information Theory 2007, 53(6):2246-2254.MathSciNetCrossRef Zhang X, Chen J, Wicker SB, Berger T: Successive coding in multiuser information theory. IEEE Transactions on Information Theory 2007, 53(6):2246-2254.MathSciNetCrossRef
39.
go back to reference Cover T, Thomas J: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 1991.MATHCrossRef Cover T, Thomas J: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 1991.MATHCrossRef
Metadata
Title
Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding
Authors
Mari Kobayashi
Mérouane Debbah
Shlomo Shamai (Shitz)
Publication date
01-12-2009
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2009/386547

Other articles of this Issue 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Go to the issue

Premium Partner