We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Information Theory

Title: Covert Multi-Access Communication with a Non-Covert User

Abstract: In this paper, we characterize the fundamental limits of a communication system with three users (i.e., three transmitters) and a single receiver where communication from two covert users must remain undetectable to an external warden. Our results show a tradeoff between the highest rates that are simultaneously achievable for the three users. They further show that the presence of a non-covert user in the system can enhance the capacities of the covert users under stringent secret-key constraints. To derive our fundamental limits, we provide an information-theoretic converse proof and present a coding scheme that achieves the performance of our converse result. Our coding scheme is based on multiplexing different code phases, which seems to be essential to exhaust the entire tradeoff region between the rates at the covert and the two non-covert users. This property is reminiscent of the setup with multiple non-covert users, where multiplexing is also required to exhaust the entire rate-region.
Comments: To be presented at ICC2024
Subjects: Information Theory (cs.IT)
Cite as: arXiv:2404.14056 [cs.IT]
  (or arXiv:2404.14056v1 [cs.IT] for this version)

Submission history

From: Abdelaziz Bounhar [view email]
[v1] Mon, 22 Apr 2024 10:14:42 GMT (262kb,D)

Link back to: arXiv, form interface, contact.