I. Introduction
Information-theoretic secrecy, first proposed by Shannon [1], provides confidentiality of transmitted information against an adversary regardless of its computational power. Shannon proved that if the adversary has access to the signals transmitted by the sender of the secret message through a noiseless channel, then, to achieve complete independence between the confidential message and the adversary's observation, the sender and the receiver have to share a secret key of the same rate as the message. Although Shannon's result implied that secret communication was impractical in this setting, it was later shown by Wyner [2] that this pessimistic result was a consequence of the noiseless channel assumption. Specifically, it was shown that when the adversary has noisy observations of the signals transmitted by the sender, a nonzero transmission rate for the secret message is achievable without requiring the transmitter to preshare a key with the receiver [2]–[4]. More recently, the fundamental rate limits at which the secret communication can take place in the presence of an eavesdropper were studied for a number of multiterminal models, e.g., the broadcast channel [5], [6], the multiple access channel [7]–[9], and the interference channel [10]–[12].