Mathematical Problems in Engineering

Volume 2013, Article ID 406826, 8 pages

http://dx.doi.org/10.1155/2013/406826

## A Class of Three-Receiver Broadcast Channels with Degraded Message Sets and Side Information

Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China

Received 30 August 2013; Revised 17 October 2013; Accepted 4 November 2013

Academic Editor: Hector Puebla

Copyright © 2013 Fangbiao Li and Zhi Xue. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

We study a class of three-receiver discrete memoryless broadcast channel (DM-BC) with three degraded message sets and side information. We derive achievable rate region for this three-receive DM-BC with side information noncausally available at the transmitter. When the receivers follow a degradedness order, we determine the perfect secrecy capacity region of this class of three-receiver DM-BC with three degraded message sets and side information noncausally available at both the transmitter and the receiver. The achievable secrecy region of this paper subsumes Steinberg’s rate region for two-receiver degraded BC with the side information and the secrecy capacity region for one-receiver two-eavesdropper DM-BC with no side information as its special cases.

#### 1. Introduction

Wyner introduced wiretap channel in his seminal paper [1]. In his communication model, a transmitter wishes to send confidential messages to a legitimate receiver while keeping the messages secret from the eavesdropper. He assumed that the channel to the eavesdropper is a physical degraded version of the channel to the legitimate receiver. He characterized the trade-off between the information rate to the receiver and the level of secrecy, as measured by equivocation. Furthermore, Wyner proposed a basic principle coding strategy to obtain secure communication for wiretap channels. Subsequently, Csiszár and Körner extended Wyner’s results to general broadcast channel with confidential messages in [2], where no degradation order exists between the legitimate receiver and the eavesdropper. They derived a capacity-equivocation region of this general, not necessarily degraded, wiretap channel.

Körner and Marton considered a general two-receiver DM-BC with degraded message sets in [3]. In their model, a common message is to be transmitted to all receivers; a private message is to be sent only to the first receiver. They determined the capacity region by using superposition coding. Information theoretic study of the -receiver ) discrete memoryless broadcast channel (DM-BC) was initiated by Borade et al. in [4]. They introduced multilevel broadcast channels, which combined some aspects of degraded message sets and established an achievable rate region (named BZT region [5]) for these channels. They simply surmised that the straightforward extension of the Körner-Marton region for two-receiver BC with degraded message sets to -receiver BC is in general optimal. Nair and El Gamal [5] showed that the direct extension of the Körner-Marton region to more than two receivers is not optimal in general. They established the capacity region for the multilevel BC and then extended the results of the multilevel BC to determine inner and outer bounds on the capacity region of the general three-receiver BC with two-degraded message sets. They proved that the capacity region for a class of three-receiver BC with two-degraded message sets can be strictly larger than the straightforward extension of the Körner-Marton region. One of the contributions of [5] is that it introduces a new decoding scheme named *indirect decoding*. Chia and El Gamal [6] considered two scenarios of three-receiver BC with common and confidential messages, two-receiver one-eavesdropper BC and one-receiver two-eavesdropper BC. In the two-receiver one-eavesdropper BC model, the confidential message is to be sent to the first and the second receivers while kept secret from the third receiver. In the second paradigm, one-receiver two-eavesdropper BC, the confidential message is to be sent to one receiver and kept secret from the other two receivers. They established inner bounds on the secrecy capacity region for these two scenarios by using Wyner channel coding, Nair-Gamal *indirect decoding* and the new ideal of generating secrecy from a public available superposition codebook. They also showed that the inner bound was tight for several special cases. Recently, Salehkalaibar et al. [7] studied one-receiver two-eavesdropper BC with three degraded message sets and proposed a more general network compared to [6].

Although all the aforementioned papers discussed the class of three-receiver BC with or without secrecy constraints, they did not consider the case where there is side information available at the transmitter or at both the transmitter and the receiver. Shannon first studied the channels with side information causally available at the transmitter in [8], where he determined the capacity region of the SISO channel. Following Shannon’s research, Gel’fand-Pinsker investigated the single-user channel with side information noncausally available at the transmitter and determined its capacity in [9]. Cover and Chiang [10] extended Gel’fand and Pinsker’s result to the case where the side information was available at both the transmitter and the receiver. After that, Steinberg [11] studied two paradigms where side information on the random parameter was provided to the transmitter in a noncausal or causal manner. He derived the inner and outer bounds on the capacity region with noncausal coding. For causal coding, he derived a single-letter characterization of the capacity region. Chia and El Gamal [12] established a lower bound on the secrecy capacity of the wiretap channel with state information available causally at both the encoder and the decoder. They showed that the lower bound is strictly larger than that for the noncausal case by Liu and Chen [13]. Recently, Hajizadeh and Hodtani [14] investigated two classes of three-receiver BC with side information available at the transmitter or at both ends, multilevel BC and three-receiver less noisy BC. For the multilevel BC with side information, they assumed that two degraded message sets are to be sent to three receivers, one for all receivers, the other only for the first receiver. They found the achievable rate region of multilevel BC with side information noncausally available at the transmitter. For the three-receiver less noisy BC with side information available at the transmitter, they assumed that three degraded message sets are to be sent to three receivers, respectively, and that the first receiver is less noisy than the second one and the second receiver is less noisy than the third one. When the side information is available at both the transmitter and the receiver, they established the capacity region of the three-receiver less noisy BC.

Different from [14], our paper considers another class of three-receiver, which is called one-receive two-eavesdropper, DM-BC with three degraded message sets and noncausally side information (see Figure 1). In this class of three-receiver BC, a common message is to be sent to three receivers (, , ), a private message is to be sent to the first and the second receiver (, ), and meanwhile unrevealed to the third receiver (, viewed as one eavesdropper); then a second private message is to be sent to the first receiver () while kept secret from the second and the third receiver (, , viewed as two eavesdroppers). The objective of this paper is to study this class of three-receive BC with side information and three degraded message sets with secrecy constraints. When the side information is noncausally available only at the transmitter, we establish the achievable rates by using a combination of superposition coding, Gel’fand-Pinsker coding scheme, and Nair-El Gamal indirect decoding. The achievable secrecy region of this paper subsumes Steinberg’s rate region for two-receiver degraded BC with the side information and the secrecy capacity region for one-receiver two-eavesdropper DM-BC with no side information as its special cases. When the side information is noncausally available at both the transmitter and the three receivers, we determine the perfect secrecy capacity region of the one-receiver two-eavesdropper BC with three degraded message sets and side information when the receivers follow a degradedness order.

The rest of this paper is organized as follows. In Section 2, we describe the channel model and present some basic definitions. In Section 3, we will divide it into two subsections. In the first subsection, we derive achievable rate region for three-receiver DM-BC when the side information is noncausally available at the transmitter. In the second subsection, we determine the perfect secrecy capacity region of three-receiver degraded DM-BC when the side information is noncausally available at both the transmitter and the receiver. Conclusions and further discussions are given in Section 4.

#### 2. Channel Model and Definitions

We denote discrete random variables and their realizations with uppercase and lowercase letters, respectively; for example, and are, respectively, the realization of and . The random variables , , , , and may take values from finite sets , , , , and . denotes the -sequence random variable, where the superscript is omitted when the choice is clear. The entropy of a discrete random variable is denoted by and the mutual information between two random variables is denoted by . We denote by the set of -strongly joint typical sequence of length , and we assume that is the sequence of random variables (, ) throughout. Furthermore, indicates the probability mass function of over and indicates the conditional probability mass function of given .

We consider a class of three-receiver discrete memoryless broadcast channels (DM-BC) with input alphabet , three output alphabets , , , set of states , each of them is finite, and a collection of conditional probability mass functions (pmfs) on . are independently and identically distributed (i.i.d.). The channel and state sequence are memoryless, for example, Denote the marginals of the channel by and , .

The states are known to be noncausally at the transmitter, or at both the transmitter and the receiver as side information. The transmitter wishes to send a common message to three receivers, to the first and the second receiver which needs to be kept secret from the third receiver and to send only to the fist receiver which needs to be kept secret from the second and the third receiver (viewed as two eavesdroppers) in uses of the channel.

A broadcast channel is said to be *physically degraded* if
in which case is a degraded version of , and is a degraded version of . According to this definition, we note that the side information parameter controls only the nondegraded channel, whereas , is independent of the .

*Definition 1. *A -code for the one-receiver two-eavesdropper DM-BC with three degraded message sets and side information available at the transmitter, as depicted in Figure 1, consists of an encoder map ,
, (common message set for ), , (private message set for and ), , (private message set for ),

and a tuple of decoding maps ,
,
. Applying the encoder to , , , which are uniformly distributed over the message sets, yields channel input =, and the corresponding channel outputs are = , = , = . In particular, we have , , , where the notation highlights that the decoded messages are estimate. The probability of error is defined as

The rate tuples of the code are defined as follows:

*Definition 2. *A rate tuple (, , ) with perfect secrecy is achievable if there exists a sequence of (, , , ) codes as previously mentioned with
where sup denotes the supremum of an expression. The capacity region with secrecy is the closure of the set of all achievable rate tuples (, , ) with secrecy.

#### 3. One-Receiver Two-Eavesdropper BC with Side Information

In this section, we first consider the scenario that the side information is noncausally available at the transmitter. We derive achievable rate region for this three-receive DM-BC with side information noncausally available at the transmitter. The achievable secrecy region is established by using a combination of Gelfand-Pinsker binning scheme and rate splitting technique. In the achievability proof scheme, superposition coding scheme will be used to divide the available randomness into different levels so as to mislead the eavesdroppers. Achievability in this case also follows from the new idea of Nair-El Gamal indirect decoding. Subsequently, we consider the scenario that the side information is noncausally available at both the transmitter and the receiver. When the side information is available at both the transmitter and the receiver, we determine the perfect secrecy capacity region of this one-receive two-eavesdropper BC with three degraded message sets with secrecy constraints as the receivers form a degradedness order. Converse proof of Theorem 6 is provided in detail.

##### 3.1. Side Information Noncausally Available at the Transmitter

Theorem 3. *Rate tuples are achievable with perfect secrecy for one-receiver two-eavesdropper DM-BC with three degraded message sets and side information noncausally available at the transmitter when is a degraded version of and is a degraded version of ; that is, forms a Markov chain, provided that
**
for some distributions and functions .*

Corollary 4. *Setting , = in achievable rates of Theorem 3, our achievable rate region with secrecy is reduced to the capacity region of the one-receiver two-eavesdropper DM-BC with three degraded message sets when , , forms a degradedness order as given in [7].*

Corollary 5. *Setting , in achievable rates of Theorem 3, the achievable rate region with secrecy is reduced to the capacity region of Steinberg’s rate region for two-receiver degraded DM-BC with noncausally side information [11].*

*Proof. *The most important part of the proof of the achievability is the code generation. We use superposition technique and Wyner’s wiretap coding [1] as the secrecy achievability method. We also employ indirect decoding scheme [5] where the first decoder finds from the satellite codewords instead of cloud centers and use superposition coding scheme to divide the available randomness into different levels, which are used to mislead the eavesdroppers.

Consider a DM-BC with . Fix and a joint distribution on . The side information alphabet set is distributed i.i.d according to
*(1) Code Generation.* Randomly and independently generate sequences , , , each one i.i.d according to and randomly throw them into bins. For each , randomly and independently generate sequences , , , , each one i.i.d according to , and randomly throw them into bins. For each , randomly and independently generate sequences , , each one i.i.d according to , and randomly throw them into bins. For each , randomly and independently generate sequences , , , , each one i.i.d according to , and randomly throw them into bins. We define . The randomness variables , , and are used to mislead the eavesdroppers.*(2) Encoding.* Given the message and side information , the encoder finds according to the bin indices since the messages are in the indices. Then, encoder looks for a in the bin of sequences such that . Then, the encoder finds such that . The encoder next finds such that . Finally, the encoder finds in the sequences such that , , , ,. We assume that the correct indices are found through the encoding procedure; that is, , , , and we send the found sequence.*(3) Decoding and Analysis of the Probability of Error.* Receiver finds by decoding , finds by decoding and finds by decoding , and finds by decoding , finds by indirectly decoding , and finds by decoding . Without loss of generality, we assume that the tuple is sent.

At receiver , the decoder finds the unique such that ; otherwise, it declares an error. Thus, the possible error events are as the follows:
Thus, the probability of error for decoder is upper bounded as
We now bound each term. By the law of large numbers (LLN) [15], tends to zero as :
Thus, as if

At receive , we can similarly bound the probability of error for . For , we define the error events
The probability of error for is then upper bounded by
By the LLN, tends to zero as . Next, we consider the event . For , is conditionally independent of given and is distributed according to . Thus, by the packing lemma [16], as if
Similarly, for event , as if
We can see that this is a redundant inequality.

At receive , we define the error events as
Therefore, the probability of error of the receiver can be made arbitrarily small if
Using a similar argument on analysis of information leakage rate as in [7], we have , if , also have if , and have if .

Subsequently, we use Gel’fand-Pinsker coding scheme and determine that the encoder can choose the proper , , indices to make the probability of error tend to zero proving that if for every and :
Finally, combining all the terms and using Fourier-Motzkin Elimination, we obtain the expressions in Theorem 3 and complete the proof of achievability.

##### 3.2. Side Information Noncausally Available at Both the Transmitter and the Receivers

Theorem 6. *The secrecy capacity region of one-receiver two-eavesdropper DM-BC with three degraded message sets and side information noncausally available both at the transmitter and at the receiver when is a degraded version of and is a degraded version , that is, forms a Markov chain, is given by the union rate tuples such that
*

*Proof*

*(1) Achievability.* Setting , , , 3, , and substituting it into (6), we can achieve the direct part of the proof.

*(2)* Converse. We define

First, we consider the rate

where (a) follows from Fano’s inequality.

Next, we consider the rate

where (a) and (c) follow from Fano’s inequality, (b) follows from the secrecy condition, and (d) and (e) follow from the Csiszár sum identity; thus, we have

(f) follows the fact

which is due to the fact that is a degraded version of .

Finally, we consider the

where (a) and (c) follow Fano’s inequality, (b) follows from the secrecy condition, (d) follows the fact that

which is due to the degradation condition, and (e) is due to the following Markov Chain:

Finally, let be a uniformly distributed random variable independent of all other random variables and define = , , , = , = , = that completes the converse proof in the standard way [15].

#### 4. Conclusion

A class of three-receiver, one-receiver two-eavesdropper, discrete memoryless broadcast channel (DM-BC) with three degraded message sets and noncausally side information is considered in this paper. We study this class of three-receiver BC with three degraded message sets and side information with secrecy constraints. We establish the achievable rates using a combination of superposition coding, Gel’fand-Pinsker binning scheme, and Nair-El Gamal indirect decoding when the side information is noncausally available at the transmitter. The achievable secrecy region of this paper subsumes Steinberg’s rate region for two-receiver degraded BC with the noncausally side information and the secrecy capacity region for one-receiver two-eavesdropper DM-BC with no side information as its special cases. As the side information is noncausally available at both the transmitter and the three receivers, we determine the perfect secrecy capacity region of the one-receive two-eavesdropper BC with three degraded message sets when the receivers follow a degradedness order; that is, forms a Markov chain. In our future work, we will consider more general three-receiver BC with two or three degraded message sets and side information causally or noncausally available at the transmitter and the receiver (the receivers without following the degradedness order).

#### Conflict of Interests

The authors declare that they have no financial and personal relationships with other people or organizations that can inappropriately influence their work, and there is no professional or other personal interest of any nature or kind in any product, service, and/or company that could be construed as influencing the position presented in, or the review of this paper.

#### Acknowledgment

This work was supported in part by the National Science Foundation of China under Grants no. 60932003 and no. 61271220.

#### References

- A. D. Wyner, “The wire-tap channel,”
*The Bell System Technical Journal*, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - I. Csiszár and J. Körner, “Broadcast channels with confidential messages,”
*IEEE Transactions on Information Theory*, vol. 24, no. 3, pp. 339–348, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - J. Körner and K. Marton, “General broadcast channels with degraded message sets,”
*IEEE Transactions on Information Theory*, vol. 23, no. 1, pp. 60–64, 1977. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - S. Borade, L. Zheng, and M. Trott, “Multilevel broadcast networks,” in
*Proceedings of the IEEE International Symposium on Information Theory (ISIT '07)*, pp. 1151–1155, June 2007. View at Publisher · View at Google Scholar · View at Scopus - C. Nair and A. El Gamal, “The capacity region of a class of three-receiver broadcast channels with degraded message sets,”
*Institute of Electrical and Electronics Engineers. Transactions on Information Theory*, vol. 55, no. 10, pp. 4479–4493, 2009. View at Publisher · View at Google Scholar · View at MathSciNet - Y.-K. Chia and A. El Gamal, “Three-receiver broadcast channels with common and confidential messages,”
*IEEE Transactions on Information Theory*, vol. 58, no. 5, pp. 2748–2765, 2012. View at Publisher · View at Google Scholar · View at MathSciNet - S. Salehkalaibar, M. Mirmohseni, and M. Reza Aref, “One-receiver two-eavesdropper broadcast channel with degraded message sets,”
*IEEE Transactions on Information Forensics and Security*, vol. 8, no. 7, pp. 1162–1172, 2013. View at Google Scholar - C. E. Shannon, “Channels with side information at the transmitter,”
*IBM Journal of Research and Development*, vol. 2, pp. 289–293, 1958. View at Google Scholar · View at MathSciNet - S. I. Gel’fand and M. S. Pinsker, “Coding for channel with random parameters,”
*Problems of Control and Information Theory*, vol. 9, no. 1, pp. 19–31, 1980. View at Google Scholar · View at MathSciNet - T. M. Cover and M. Chiang, “Duality between channel capacity and rate distortion with two-sided state information,”
*IEEE Transactions on Information Theory*, vol. 48, no. 6, pp. 1629–1638, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet - Y. Steinberg, “Coding for the degraded broadcast channel with random parameters, with causal and noncausal side information,”
*IEEE Transactions on Information Theory*, vol. 51, no. 8, pp. 2867–2877, 2005. View at Publisher · View at Google Scholar · View at MathSciNet - Y.-K. Chia and A. El Gamal, “Wiretap channel with causal state information,”
*IEEE Transactions on Information Theory*, vol. 58, no. 5, pp. 2838–2849, 2012. View at Publisher · View at Google Scholar · View at MathSciNet - W. Liu and B. Chen, “Wiretap channel with two-sided channel state information,” in
*Proceedings of the 41st Asilomar Conference on Signals, Systems and Computers (ACSSC '07)*, pp. 893–897, Pacific Grove, Calif, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus - S. Hajizadeh and G. A. Hodtani, “Three-receiver broadcast channels with side information,” in
*Proceedings of the IEEE International Symposium on Information Theory (ISIT '12)*, pp. 393–397, Boston, Mass, USA, July 2012. - T. M. Cover and J. A. Thomas,
*Elements of Information Theory*, Wiley-Interscience, New York, NY, USA, 2nd edition, 2006. View at MathSciNet - A. El Gamal and Y.-H. Kim,
*Network Information Theory*, Cambridge University Press, Cambridge, Mass, USA, 2011. View at MathSciNet