Abstract

We introduce the wiretap channel with action-dependent states and rate-limited feedback. In the new model, the state sequence is dependent on the action sequence which is selected according to the message, and a secure rate-limited feedback link is shared between the transmitter and the receiver. We obtain the capacity-equivocation region and secrecy capacity of such a channel both for the case where the channel inputs depend noncausally on the state sequence and the case where they are restricted to causal dependence. We construct the capacity-achieving coding schemes utilizing Wyner's random binning, Gel'fand and Pinsker’s coding technique, and rate splitting. Furthermore, we compare our results with the existing approaches without feedback, with noiseless feedback, and without action-dependent states. The simulation results show that the secrecy capacity of our model is bigger than that of the first two existed approaches. Besides, it is also shown that, by taking actions to affect the channel states, we guarantee the data integrity of the message transmitted in the two-stage communication systems although the tolerable overhead of transmission time is brought.

1. Introduction

The framework of channels with action-dependent states was first introduced by Weissman [1] to model scenarios in which transmission took place in two successive phases. In the first phase, a message-dependent action sequence was selected by the encoder. The action sequence affected the formation of the channel states. In the second phase, the transmitter began to send the message to the receiver in the presence of the action-dependent states. In [1], the capacity of such a channel both for the case where the channel inputs were allowed to depend noncausally on the channel states and the case where they were restricted to causal dependence was obtained. After the publication of Weissman's work, a number of extensions of the results in [1] have been reported; see [26].

However, the above scenarios considered no security constraints which are essential in many communication systems. For instance, the broadcast nature of wireless networks gives rise to the hidden danger of information leakage to the malicious receiver when broadcasting sensitive data and acquiring channel state information. The secure communication for the wiretap channel was first studied by Wyner [7]. In his model, the transmitter aimed to send a confidential message to the receiver through a noisy discrete memoryless channel (DMC) and keep the wiretapper as ignorant of the message as possible. The wiretapper observed a degraded version of the legitimate receiver's observation through another DMC. Equivocation was introduced in [7] to measure wiretapper's uncertainty of the confidential message. Wyner characterized the secrecy capacity, that is, the best transmission rate under perfect secrecy, as the difference between the capacity of the main channel and the wiretap channel. This model was further explored by many researchers; see [814]. Among them, Dai et al. studied the wiretap channel with action-dependent states [13] and gave the lower and upper bounds on the capacity-equivocation region. The capacity-equivocation region is the set of all the achievable rate pairs , where and are the rates of the confidential message and wiretapper's equivocation about the message.

Note that the action-dependent channel models [16] as well as the wiretap channel models [714] only dealt with one-way communication. However, many systems involve two-way communication. For example, feedback links are usually seen in satellite communication, telephone connections, and wireless sensor networks. To investigate the effects of the feedback on secrecy capacity, Ahlswede and Cai first studied the wiretap channel with noiseless causal feedback [15], where the channel output symbol is fed back to the transmitter and used as a secret key. Then, Ardestanizadeh et al. studied the problem of secure communication over a wiretap channel with a rate-limited feedback link [16]. The main contribution of [16] was that the upper and lower bounds on the secrecy capacity were obtained as a function of the secure feedback rate . Moreover, the recursive argument was introduced to find the single-letter characterization of the upper bound and claimed to be a powerful tool for similar problems [16]. Besides, Yin et al. [17] studied the discrete memoryless broadcast channels with noiseless feedback based on [15, 16]. The channel model in [17] did not consider channel state information. Recently, Dai et al. studied the wiretap channel with action-dependent states and noiseless feedback [18]. In Dai's model, similar to [15], the output symbol received at the receiver was fed back securely to the transmitter and used as a shared key between the transmitter and the receiver. However, in [15, 18], only part of the feedback contributed to the secure communication and the wiretapper was provided a chance to get the secret message by guessing the legitimate receiver's channel output with its own channel observation. Then, it is natural to ask whether the feedback can be used more efficiently and securely.

Inspired by [16, 18], this paper studies a new model, that is, wiretap channel with action-dependent states and rate-limited feedback; see Figure 1. In the model, the feedback is independent of the channel output and sent to the transmitter through a secure feedback link of rate . The formation of the channel states is affected by the message-dependent action sequence. This model can provide insights into the value of two-way two-phase interactions in communication systems. Note that since the feedback symbol is independent of the channel output, the wiretapper attempt to get the secret key by guessing the legitimate receiver's channel output is in vain. The contributions of this work are summarized as follows.(i)The capacity-equivocation region of the channel model in Figure 1 is obtained both for the case where the inputs of the main channel depend noncausally on the channel states and the case where they depend causally on the channel states. The capacity-equivocation region is presented in Section 2. Besides, the secrecy capacity of the channel model in Figure 1 is also got. We calculate the secrecy capacity of a binary example in Section 3.(ii)To achieve the secrecy capacity, we construct several coding schemes and evaluate their reliability and security using the techniques of Wyner's random binning, Gel'fand and Pinsker's coding, and rate splitting. The coding schemes are presented in the Appendices.(iii)The rate-limited feedback is added in our model. The secrecy capacity of our approach is bigger than that of the model without feedback. This indicates that feedback is useful for increasing the secrecy capacity. The corresponding simulation is presented in Section 3.(iv)The capacity-equivocation region of the wiretap channel with action-dependent states and noiseless feedback [18] is included in our results by setting the feedback rate to be a specific value. We find that the secrecy capacity of our model is bigger than that of [18]. Specifically, when the wiretap channel is in the “best” condition, it is unable to transmit message securely using the approach in [18], while our approach can still work. Section 3 discusses the result in detail.(v)The (degraded) wiretap channel with secure rate-limited feedback [16] is a special case of our model. The secrecy capacity of [16] can be obtained from our results without considering the action-dependent states. Our approach can guarantee data integrity in the two-stage systems. However, data integrity cannot be guaranteed by using the approach in [16] where no actions were taken. This result is illustrated in Section 3.

The remainder of the paper is organized as follows. Section 2 presents our new model and two theorems. Section 3 gives the secrecy capacity of our model and compares it with the existing channel models through simulation. We conclude in Section 4 with a summary of the whole work and some future directions.

2. Channel Models and Main Results

In this section, the notations of characters and variables are given in Section 2.1. The channel model is described in Section 2.2. The main results, that is, the capacity-equivocation region of the model in Figure 1 with causal and noncausal states, are presented in Section 2.3.

2.1. Notations

Throughout this paper, we use calligraphic letters, for example, , , to denote the finite sets and to denote the cardinality of the set . Uppercase letters, for example, , , are used to denote random variables taking values from finite sets, for example, , . The value of a random variable is denoted by the lowercase letter . We use to denote the -vectors of random variables for , and we will always drop the subscript when . Moreover, we use to denote the probability mass function of the random variable . For and , the set of the typical -sequences is defined as , where denotes the frequency of occurrences of letter in the sequence . (For more details about typical sequences, please refer to [19, Chap. 2].) The set of the conditional typical sequences, for example, , follows similarly. In this paper, it is assumed that the base of the function is 2.

2.2. Wiretap Channel with Action-Dependent States and Rate-Limited Feedback

We consider the wiretap channel with action-dependent states and rate-limited feedback, as shown in Figure 1. The transmitter aims to convey a confidential message which is uniformly distributed over to the legitimate receiver whose observation is . The confidential message should be kept secret from the wiretapper as much as possible. We use equivocation at the wiretapper to characterize the secrecy of the confidential message. Given the message , an action sequence is selected. The channel state sequence is generated in response to the action sequence and accessible to the channel encoder. To enhance the secrecy of the communication, the receiver feeds back symbols to the encoder over a feedback link of rate . The feedback symbol is assumed to be independent of the channel output and kept secret from the wiretapper. Then, the input sequence of the main channel is generated based on the message , the channel state sequence , and the feedback symbol . The output sequence of the main channel is distributed as . With the received , the decoder outputs the decoded message . The wiretap channel is also a DMC with transition probability , where is the observation of the wiretapper. Note that the wiretap channel is assumed to be degraded from the main channel; that is, form a Markov chain. More precisely, we define the code in Definition 1.

Definition 1. The code for the wiretap channel with action-dependent states and rate-limited feedback is defined as follows.(i)The feedback alphabet satisfies . The feedback symbol is generated independently of the channel output symbols and uniformly distributed over .(ii)The message is uniformly distributed over . The action sequence is selected from a deterministic mapping . The state sequence is generated as the output of a memoryless channel whose input is .(iii)The stochastic channel encoder is specified by a matrix of conditional probability distributions , where , , , and . Note that is the probability that the message , the state sequence , and the feedback are encoded as the channel input . When the state sequence is known causally to the channel encoder, the channel encoder at time is , where is the output of the channel encoder at time , is the feedback symbol at time , and is the channel states before time . When the channel encoder knows the state sequence in a noncausal manner, the channel encoder at time is . For the causal manner, Shannon strategy will be used in the encoding scheme (see Appendix A). For the noncausal manner, Gel'fand and Pinsker's coding technique [20] will be used (see Appendix C).(iv)The decoder is a mapping . The input of the decoder is and the output is . The decoding error probability is defined as .(v)The equivocation of the message at the wiretapper is defined as

Definition 2. A rate pair is said to be achievable for the model in Figure 1 if there exists a code defined in Definition 1, such that where is an arbitrary small positive real number and , are the rates of the message and equivocation. The capacity-equivocation region is defined as the convex closure of all achievable rate pairs .

Definition 3. The secrecy capacity is defined as the maximum rate at which the confidential message can be sent to the receiver in perfect secrecy; that is, . The secrecy capacity is where is the capacity-equivocation region.

The capacity-equivocation regions of the model in Figure 1 with causal and noncausal channel states are shown in Theorems 4 and 5, respectively; see Section 2.3.

2.3. Main Results

Theorem 4. For the wiretap channel with causal action-dependent states and rate-limited feedback, the capacity-equivocation region is the set where form a Markov chain and is the rate of the feedback link.

Comments. (i) The proof of Theorem 4 is given in Appendices A and B. In Appendix A, a coding scheme is provided to show the achievability of the rate pair in . The proof of the converse part is shown in Appendix B. (ii) The set is convex, and the proof is similar to that of [8, lemma 5]. (iii) To exhaust , it is enough to restrict to satisfy . It can be easily proved by using the support lemma [21, page 310].

Theorem 5. For the wiretap channel with noncausal action-dependent states and rate-limited feedback, the capacity-equivocation region is the set where form a Markov chain and is the rate of the feedback link.

Comments. (i) The proof of Theorem 5 is given in Appendices C and D. In Appendix C, a coding scheme is provided to show the achievability of the rate pair in . The proof of the converse part is shown in Appendix D. (ii) The set is convex, and the proof is similar to that of [8, lemma 5]. (iii) To exhaust , it is enough to restrict to satisfy . It can be easily proved by using the support lemma [21, page 310].

3. Discussion and Simulation

In this section, we first calculate the secrecy capacity of our model and show how the secrecy capacities of several existing channel models are derived from our results. Then, to better illustrate how our approach improves the existing results, we consider a binary symmetric channel with causal action-dependent states and rate-limited feedback. We try to compare the secrecy capacities of our model and the existing channel models through simulation.

3.1. Discussion

According to the definition in (3), the secrecy capacity of wiretap channel with causal action-dependent states and rate-limited feedback is We see that the secrecy capacity is a function of the feedback rate . By setting , where (7) is from the Markov chain . Substituting (8) into (6), we have which is the secrecy capacity of the causal case in [18].

Similarly, according to the definition in (3), the secrecy capacity of wiretap channel with noncausal action-dependent states and rate-limited feedback is By setting , (10) turns into which is the secrecy capacity of the noncausal case in [18].

We should emphasize that the feedback in [18] comes from the output of the main channel and is used as a shared key between the transmitter and receiver. This kind of feedback mechanism gives rise to potential danger of revealing the key to the wiretapper since the wiretapper can guess the output of the main channel indirectly to get the key. Our approach avoids this potential danger of information leakage by constructing a feedback link and generating the feedback independently of the main channel's output.

In addition, without considering the causal or noncausal action-dependent states in the model of Figure 1, the secrecy capacity turns into which coincides with the secrecy capacity of the (degraded) wiretap channel with rate-limited feedback [16].

To better illustrate how our approach improves these models, such as channel without feedback, with noiseless feedback [18], and without actions [16], we present the simulation in the following subsection.

3.2. Simulation and Comparison

In the example, we consider a binary symmetric channel with causal action-dependent states and rate-limited feedback. The channel model is shown in Figure 2. Let the main channel be a binary symmetric channel (BSC), and let its crossover probability be affected by the channel states. The wiretap channel is also assumed to be a BSC with crossover probability . In a more accurate way, define where , , and .

To simplify the math, let the channel from the action to the channel states be a BSC with crossover probability equal to ; that is, the channel states are totally determined by the action sequence. Similar to the arguments in [1, 13, 18], the maximum values of , , and are achieved when and are deterministic mappings. This implies that . We choose and as where . Let , where . Then, the joint distribution can be calculated. Since by taking some mathematical calculation, we can get where and is the binary entropy function; that is, . The calculation of the above is based on the information theoretic methods which involve the knowledge of Information Theory and Probability Theory. They are standard techniques, so it is not difficult to obtain the result of formula (15). The computation complexity of the calculation process is low. Similar arguments for calculating secrecy capacity can be seen in [1, 18]. Figure 3 shows that starts from and increases linearly with until it gets saturated at for feedback rate .

When and is fixed, the value of changing with is shown in Figure 4. It can be seen from Figure 4 that when the crossover probability of the main channel is , the secrecy capacity is equal to . This result is straightforward since the legitimate receiver cannot correctly decode the message when the main channel is in the “poorest” condition. When the main channel condition gets better, that is, increases from to , the maximum value of increases. The secrecy capacity reaches when the crossover probability of the main channel . This is because when the main channel is noiseless, the input of main channel is the same as receiver's observation. This implies that the input of the main channel can be seen as the input of the wiretap channel.

When no feedback is imposed, that is, , Figure 5 shows the secrecy capacity changing with when is fixed. As can be seen from Figure 5, when the quality of the wiretap channel gets better, that is, increases from to , the secrecy capacity decreases. This warns the transmitter to pay attention to the trade-off between the transmission rate and confidentiality. When the wiretap channel is noiseless (), the secrecy capacity is zero no matter how good the quality of the main channel is. It results from the fact that the wiretapper has the same observation as the receiver. Note that when the crossover probability of the wiretap channel is , the secrecy capacity is which is the capacity of the main channel. This is because no information leakage emerges when the wiretap channel is in the “poorest” condition.

The comparison among our approach, the model without feedback, the model with dependent noiseless feedback [18], and the model without taking actions [16] is presented as follows.

3.2.1. Feedback versus No Feedback

The comparison on the secrecy capacity between the channel with feedback and the channel without feedback is shown in Figures 6 and 7. It can be seen from Figure 6 that the secrecy capacity of the model without feedback is covered by that with feedback. This indicates that the secrecy capacity of our approach is bigger than the channel model without feedback, and feedback can increase the secrecy capacity. To see it more clearly, we pick out four cross sections shown in Figure 7. In the lower right subgraph of Figure 7 where the wiretap channel is noiseless (i.e., ), the secrecy capacity for the channel with and without feedback is a positive value and zero, respectively. This implies the fact that when the wiretap channel is noiseless and no feedback is imposed, no information can be securely transmitted to the receiver. Luckily, by introducing feedback, our approach makes it possible to transmit the message securely even if the wiretap channel is in the “best” condition.

3.2.2. Independent Feedback versus Dependent Feedback

Figures 8 and 9 present the secrecy capacities of our approach (with independent feedback) and the model [18] (with dependent feedback). In Figure 8, we can see that the secrecy capacity of our approach covers the secrecy capacity of [18]. To see it more clearly, we also choose four cross-sections shown in Figure 9. In general, the secrecy capacity of our approach is bigger than the model with noiseless feedback [18]. Concretely, one has the following.(i)According to the results shown in [18], the secrecy capacity of the binary channel with causal channel states and noiseless feedback is . It is easy to see that when . The difference between and is that there exists in the expression of . Note that is brought by which is the wiretapper's uncertainty of the output of the main channel.(ii)As can be seen from Figure 9, the maximum secrecy capacity gap between our approach and [18] is enlarged with the increase of , and so does the range of variation of the main channel's transition probability when . This indicates that when the quality of the wiretap channel becomes better (i.e., increases from 0.5 to 1.0), the number of the main channels, in which our approach brings about bigger secrecy capacities than those in [18], increases.(iii)In Figures 8 and 9, we also see that when increases (from 0.5 to 1.0), the maximum value of secrecy capacity in our approach and the model with noiseless feedback [18] decreases. This results from the fact that when varies from to , the condition of the wiretap channel gets better so that the wiretapper is more able to obtain the confidential message.(iv)In the lower right subgraph of Figure 9 where (i.e., the wiretap channel is noiseless), the secrecy capacity of the model with noiseless feedback [18] is zero. This indicates that it is unable to transmit the message securely over the channel. However, the secrecy capacity of our approach is positive. This means that the transmitter can still send the message securely although the wiretapper is more “powerful” than the legitimate receiver.

We can also explain the results from the aspect of feedback. In the channel model with noiseless feedback [18], the feedback is dependent on the output of the main channel and used as a shared key between the transmitter and the receiver. This enables the wiretapper to get the key and, further, the confidential message by guessing the output of the main channel indirectly. However, in our model, since the feedback is independent of the channel output, the wiretapper tries in vain to get the key through guessing the channel output. Therefore, our approach makes the system more secure.

3.2.3. Actions versus No Actions

We consider six representative cases to evaluate the secrecy capacities of our model and the model without actions [16].

Case 1 (). The main channel is almost “perfect,” while the wiretap channel is in the “poorest” condition.

Case 2 (). The main channel is better than the wiretap channel. They are both in “good” condition.

Case 3 (). The main channel and wiretap channel share the same transition probability. They are both in “good” condition.

Case 4 (). The wiretap channel is better than the main channel. They are both in “good” condition.

Case 5 (). The wiretap channel is almost “perfect,” while the main channel is in the “poorest” condition.

Case 6 (). The main channel and wiretap channel share the same transition probability. They are both in the “poorest” condition.

Our model provides insights into the value of actions in the two-stage coding systems, such as recording for magnetic storage devices and coding for computer memories with defects. To better explain the value of actions, let us consider an example of writing information into a memory with defects. The memory can be seen as the main channel in our model, the location of the defects corresponds to the channel states, and writing information into the memory corresponds to transmitting information over the channel. Before writing information into the memory, suppose that neither encoder nor decoder knows the locations of the defects. In the first stage, the encoder writes into the memory for the first time. It gets a noisy version of the inputs when it reads from the memory. Then, in the second stage, the encoder rewrites at whichever memory locations it chooses before the decoder attempts to decode the information [1]. Note that, in the second stage, the encoder will have some knowledge about the memory defects according to the information written in the first stage and the noisy version it reads from the memory in that stage. The first stage can be seen as the “preparing stage” in which the encoder takes “actions” to learn about the defects (i.e., channel state).

Figure 10 shows the process of writing eight data blocks into a memory with defects by our approach and the approach in [16] where no actions were taken. As can be seen from Figure 10, without taking actions to probe the locations of the defects, some data blocks are missed after they are written into the memory. It is well known that data integrity is one of the most important aspects of communication. From the above example, by introducing actions in such two-stage systems, the integrity of the transmitted data is guaranteed. Therefore, the scheme in [16] where no actions were taken is unsuitable for the two-stage systems. From this point of view, our assumption that the encoder takes actions to acquire channel state information is essential and valuable.

At the same time, the cost of taking actions is that the secrecy capacity decreases; see Figure 11. The secrecy capacity of the binary example without actions [16] is . As can be seen from Figure 11, when the rate of the feedback link is less than a specific value, the secrecy capacity of our approach is equal to the secrecy capacity of the model [16]. This means no extra transmission time (or channel use) is produced by introducing “actions” when is small. However, when is greater than a specific value, the secrecy capacity is . This indicates that the “actions” bring the overhead of transmission time. Concretely, the extra overhead of the transmission time is shown in Table 1.

From Table 1, we can see that when , (Case 2), the overhead of the transmission time shows an increase of 3.37 percent over the approach [16] where no action-dependent states were considered. When , and , , the extra time overhead is and percent, respectively. In general, the extra time overhead is small. On the premise of data integrity, the amount of such extra time overhead is tolerable.

4. Conclusion

This paper studies the wiretap channel with action-dependent states and rate-limited feedback. It is a degraded channel model where the wiretap channel is degraded from the main channel. The capacity-equivocation region of such a channel both for the case where the channel inputs depend noncausally on the state sequence and the case where they are restricted to causal dependence is obtained. This paper also gets the secrecy capacities for both cases. At the same time, we construct capacity-achieving coding schemes using the methods of Wyner's random binning, Gel'fand and Pinsker's coding technique, and rate splitting. The simulation results show that using feedback can increase the secrecy capacity of the channel in Figure 1, and the secrecy capacity of our model is bigger than that of [16, 18]. Besides, we also find that taking actions to affect the channel states can ensure the data integrity of the message transmitted in the two-stage systems although the tolerable overhead of transmission time is brought.

Some potential directions that our work leaves open for future study are as follows.(i)Nondegraded Wiretap Channel. In this paper, the wiretap channel is degraded from the main channel where . This indicates that form a Markov chain. However, the degraded wiretap channel is a special case of non-degraded wiretap channel where does not need to hold. Without this Markov chain, the coding schemes as well as the proof of converse part will be different, and further the secrecy capacity of the non-degraded wiretap channel will be different from the current results.(ii)Adaptive Action. Adaptive action means that the action sequence is generated by the message and the previous channel states, that is, . Adaptive action is widely used in many applications such as information hiding, digital watermarking, and data storage in the memory. It is valuable to study the adaptive action in our model. From [22], we have already known that adaptive action is not useful in increasing the point-to-point channel capacity. We will study whether it influences the secrecy capacity of our channel model.(iii)Multiple Transmitters or Receivers. Nowadays, many types of communication involves two or more transmitters (or receivers), such as the multiple-access channel (MAC), broadcast channel (BC), and multiple-input-multiple-output (MIMO) channel. By introducing action-dependent states and feedback in such channels (with an additional wiretapper), we can revisit their capacity-equivocation regions and secrecy capacities.

Besides, the Gaussian wiretap channel with action-dependent states and feedback is also a practical channel model that is worthy of being explored.

Appendices

A. Coding Schemes for Causal Channel State Information

This section provides the coding schemes to achieve . Similar to the coding scheme in [18], two different coding schemes for and are constructed in Cases 1 and 2, respectively.

Case 1 (). In Case 1, we need to show that all rate pairs , satisfying are achievable. It is sufficient to prove that the rate pairs are achievable. In the coding scheme, Wyner's random binning technique and rate splitting are used. The feedback symbol is used as a shared secret key between the transmitter and the receiver. The wiretapper is assumed to have no knowledge of the secret key.
Split the message into two parts, that is, . The corresponding random variables , are uniformly distributed over and , where
Define three alphabets , , and satisfying Note that .
Since , let and , where is an arbitrary set such that holds and . Define a deterministic mapping from into , which partitions into subsets of size . The codebook is constructed as follows.
Codebook Generation and Encoding. Generate independent and identically distributed (i.i.d) action sequences according to , where . The channel state sequence is generated through the discrete memoryless channel .
The feedback link is shared between the transmitter and the legitimate receiver. It is assumed that a secret key is transmitted through the feedback link. Let the corresponding random variable be independent of and uniformly distributed over .
For each , generate independent and identically distributed (i.i.d) sequences according to . Put these sequences into bins so that each bin contains sequences , where the bin index and the sequence index .
Suppose that is the shared secret key between the transmitter and the receiver during one transmission. To send message with the action sequence and the state sequence , where , , and , randomly choose a sequence from the bin indexed by . Here is modulo addition over . Then, the input sequence of the main channel is generated by .
Decoding. When observing the channel output , the receiver tries to find a sequence such that . Then, the decoder outputs , where is modulo subtraction over . If no such exists, take .
Analysis of Error Probability. By using similar arguments in [1], it is easy to show that the legitimate receiver can decode the message with vanishing probability of decoding error. The details for proving are omitted.
Analysis of Equivocation. We focus on calculating wiretapper's equivocation of the message, that is, the uncertainty about the message given wiretapper's observation. To serve the analysis of equivocation, the fact that is independent of will be shown firstly. Using similar derivation in [18], we start with the definition of mutual independence where and follow from the fact that is independent of and and follow from the fact that and are both uniformly distributed over . According to (A.4), Therefore, is independent of .
Utilizing the above fact, where follows from the Markov chain , follows from the fact that is independent of , and follows from the fact that is uniformly distributed over . To bound in (A.6), Csiszar's method for analyzing equivocation [8] is used: In the above derivations, follows from the fact that is a Markov chain. follows from the fact that , and are i.i.d generated and both the main channel and wiretap channel are discrete memoryless. follows from the fact that , where is regarded as the general random variable of . To verify , note the fact that given the message , the number of is By applying the standard channel coding theorem [23, Theorem ], the wiretapper can decode with vanishing decoding error probability. Then, utilizing Fano's inequality, we get , where when . (A.7) is verified.
Using the definition of equivocation and substituting (A.7) into (A.6),
This completes the achievability proof of Case 1.

Case 2 (). In Case 2, we show that all rate pairs , satisfying are achievable. It is sufficient to prove that the rate pairs are achievable. The coding scheme is similar to [18].
Codebook Generation and Encoding. Generate action sequences according to , where . The state is generated in response to according to . Generate i.i.d sequences according to . To send message with the action sequence and the state sequence , find the sequence . Then, the input sequence of the main channel is generated by .
Decoding. When observing the channel output , the receiver tries to find a sequence such that . Then, the decoder outputs . If no such exists, take .
Analysis of Error Probability. By using similar arguments in [1], it is easy to show that the legitimate receiver can decode the message with vanishing probability of decoding error. The details for proving are omitted.
Analysis of Equivocation. We focus on calculating wiretapper's equivocation of the the message, that is, the uncertainty about the message given wiretapper's observation. The method for calculating the equivocation in [13] is utilized in this case: where follows from the fact that the action sequence is a determination function of the message and follows from the fact that and are i.i.d generated and both the main channel and wiretap channel are discrete memoryless. This completes the achievability proof of Case 2.
The achievability proof of Theorem 4 is completed.

B. Proof of the Converse Part of Theorem 4

In this section, we show that all achievable rate pairs for the channel model in Figure 1 with causal states are contained in . Concretely, for any rate pair , feedback alphabet , and decoding error probability satisfying there exist random variables such that The four inequalities (B.5), (B.6), (B.7), and (B.8) will be proved successively.

One has consider condition (B.5) first. where is from (B.1). Condition (B.5) is proved.

To prove condition (B.6), we consider Inequality is from Fano's inequality. To be more accurate, , where is the binary entropy function; that is, . Note that when approaches zero. is from defining . According to (B.1) and (B.10), it is easy to see that where follows from the fact that is uniformly distributed over .

To prove condition (B.7), the recursive argument lemma [16] will be exploited. Therefore, we present the lemma below. The detailed proof of the lemma is shown in [16].

Recursive Argument Lemma [16]. For each , the following inequality holds: where , , , and are the the feedback random variable, the input of the main channel, the input of the wiretap channel, and the output of the wiretap channel. (Actually, [16] gave the lemma under a more relaxed condition that the wiretap channel did not need to be physically degraded.)

Then, we prove condition (B.7) as follows: where follows from Fano's inequality. By applying the lemma recursively, the two terms in (B.13) can be single letterized as follows: Substituting (B.14) into (B.13), we get

To prove (B.8), consider where follows from the fact that the action sequence is a deterministic function of the message .

To serve the single-letter characterization, let us introduce a time-sharing random variable independent of , , , , , , and and uniformly distributed over . Set It is straightforward to see that and form Markov chains. Then, it is easy to get where follows from the Markov chain . After using the standard time sharing argument [19, Section 5.4], utilizing (B.18), and letting , (B.11), (B.15), and (B.16) are simplified into (B.6), (B.7), and (B.8), respectively.

This completes the proof of the converse part of Theorem 4.

C. Coding Schemes for Noncausal Channel State Information

This section provides two different coding schemes for and in Cases 1 and 2, respectively.

Case 1 (). In this case, we need to prove that all rate pairs , satisfying are achievable. It is sufficient to prove the rate pairs are achievable. In the following coding scheme, Gel'fand and Pinsker's coding technique [20] and rate splitting are used. The feedback symbol is used as a shared secret key between the transmitter and the receiver. The wiretapper has no knowledge of the secret key.
Define Split the message into two parts, that is, . The corresponding random variables , are uniformly distributed over and . Since it is easy to get
Codebook Generation and Encoding. Let , where is a fixed positive number. Generate i.i.d action sequences according to where . The channel state sequence is generated through the discrete memoryless channel .
The feedback link is shared between the transmitter and the legitimate receiver. It is assumed that a secret key is transmitted through the feedback link and the wiretapper has no knowledge about the secret key. Let the corresponding random variable be independent of and uniformly distributed over .
For each , generate i.i.d sequences according to , where as . Note that Then, put these sequences into bins so that each bin contains sequences , where the bin index and the sequence index .
Suppose that is the shared secret key between the transmitter and the receiver during one transmission. To send message with the action sequence and the state sequence , where , , the transmitter tries to find a sequence from the bin indexed by such that . Here, is modulo addition over . If no such sequence exists in that bin, take . (In fact, at least one such sequence will exist because there are more than in each bin.) Then, The input sequence of the main channel is generated by .
Decoding. When observing the channel output , the receiver tries to find a sequence such that . Then, the decoder outputs , where is modulo subtraction over . If no such exists, take .
Analysis of Error Probability. By using similar arguments in [1], it is easy to show that the legitimate receiver can decode the message with vanishing decoding error probability. Note that since Gel'fand and Pinsker's coding technique is used for the noncausal case, particular attention should be paid to the encoding error probability when calculating the whole error probability. The details for proving are omitted.
Analysis of Equivocation. We focus on calculating wiretapper's equivocation of the message, that is, the uncertainty about the message given wiretapper's observation.
Using the same derivation in (A.6), we have The first term in (C.6) is calculated by applying Csiszar's method for analyzing equivocation [8]: In the above derivations, follows from the fact that is a Markov chain. follows from the fact that , , and are i.i.d generated and both the main channel and wiretap channel are discrete memoryless. follows from , where is regarded as the general random variable of . To verify , note the fact that given the message , the number of is
By applying the standard channel coding theorem [23, theorem 7.7.1], the wiretapper can decode with vanishing decoding error probability. Then, utilizing Fano's inequality, we get , where when . (C.7) is verified.
Substituting (C.7) into (C.6) and using the same derivation in (A.9), the achievability proof of Case 1 is completed.

Case 2 (. In this case, we show that all rate pairs , satisfying are achievable. It is sufficient to prove that the rate pairs are achievable. Gel'fand and Pinsker's coding technique is used. The proof is similar to that in [18].
Codebook Generation and Encoding. Let , where is a fixed positive number. is uniformly distributed over . Generate action sequences according to , where . The channel state sequence is generated through the discrete memoryless channel . For each , generate i.i.d sequences according to , where .
To send message with the action sequence and the state sequence , the transmitter chooses a sequence such that . If no such sequence exists, take . Then, the input sequence of the main channel is generated by .
Decoding. When observing the channel output , the receiver tries to find a sequence such that . Then, the decoder outputs . If no such exists, take .
Analysis of Error Probability. By using similar arguments in [1], it is easy to show that the legitimate receiver can decode the message with vanishing decoding error probability. Note that since Gel'fand and Pinsker's coding technique is used for the noncausal case, particular attention should be paid to the encoding error probability when calculating the whole error probability. The details for proving are omitted.
The analysis of equivocation is the same as (A.11). The achievability proof of Case 2 is finished.
The achievability proof of Theorem 5 is completed.

D. Proof of the Converse Part of Theorem 5

This section proves that all achievable rate pairs for the channel model in Figure 1 with noncausal states are contained in . Concretely, we need to show that, for any rate pair , feedback alphabet , and decoding error probability satisfying (2), there exist random variables such that The four inequalities (D.1), (D.2), (D.3), and (D.4) are proved as follows.

(D.1), (D.3), and (D.4) can be proved using the same derivations in (B.9), (B.15), and (B.16), respectively, except for the identification of the auxiliary random variable . Therefore, we focus on proving (D.2) and giving the identification of the auxiliary random variable .

A lemma in [13] is presented first.

Lemma 6 (see [13]). One has

Proof. One has where follows from the fact that the action sequence is a deterministic function of the transmitted message.
Since the transmission rate is let us consider where follows from Fano's inequality, is from Lemma 6, follows from the fact that form a Markov chain, and follows from defining . Substituting (D.8) into (D.7), To serve the single-letter characterization, let us introduce a time-sharing random variable independent of , , , , , , and and uniformly distributed over . Set It is straightforward to see that form a Markov chain. Applying the standard time-sharing argument [19, Section 5.4] to (D.9), we can easily get (D.2).
This completes the proof of the converse part of Theorem 5.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grants no. 61171173, 60932003, and 61271220. The authors also would like to thank the anonymous reviewers for helpful comments.