We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Information Theory

Title: Byzantine Multiple Access Channels -- Part I: Reliable Communication

Abstract: We study communication over a Multiple Access Channel (MAC) where users can possibly be adversarial. The receiver is unaware of the identity of the adversarial users (if any). When all users are non-adversarial, we want their messages to be decoded reliably. When a user behaves adversarially, we require that the honest users' messages be decoded reliably. An adversarial user can mount an attack by sending any input into the channel rather than following the protocol. It turns out that the $2$-user MAC capacity region follows from the point-to-point Arbitrarily Varying Channel (AVC) capacity. For the $3$-user MAC in which at most one user may be malicious, we characterize the capacity region for deterministic codes and randomized codes (where each user shares an independent random secret key with the receiver). These results are then generalized for the $k$-user MAC where the adversary may control all users in one out of a collection of given subsets.
Comments: This supercedes Part I of arxiv:1904.11925
Subjects: Information Theory (cs.IT)
Cite as: arXiv:2211.12769 [cs.IT]
  (or arXiv:2211.12769v2 [cs.IT] for this version)

Submission history

From: Neha Sangwan [view email]
[v1] Wed, 23 Nov 2022 08:37:54 GMT (85kb)
[v2] Sun, 8 Jan 2023 12:57:58 GMT (95kb)

Link back to: arXiv, form interface, contact.