Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming

被引:0
|
作者
Nikkhah, Ali [1 ,2 ]
Shoushtari, Morteza [3 ]
Akhbari, Bahareh [1 ]
Harrison, Willie K. [3 ]
机构
[1] KN Toosi Univ Technol, Fac Elect Engn, Tehran 1631714191, Iran
[2] Linkoping Univ, Dept Comp & Informat Sci, S-58183 Linkoping, Sweden
[3] Brigham Young Univ, Dept Elect & Comp Engn, Provo, UT 84602 USA
关键词
Secrecy coding; binary symmetric channel; wiretap channel; equivocation rate; finite blocklength codes; linear programming; LDPC CODES; SECURITY;
D O I
10.1109/TIFS.2025.3545301
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation when coding over a wiretap channel model where the main channel is noiseless and the eavesdropper's channel is a binary symmetric channel (BSC). Using this technique, we present a numerically-derived upper bound for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional infinite blocklength bounds. We also propose a secrecy coding technique that outperforms random binning codes. When there is one overhead bit, this coding technique is optimum and achieves the newly derived bound. For cases with additional bits of overhead, our coding scheme can achieve equivocation rates close to the new bound. Furthermore, we explore the patterns of the generator matrix and the parity-check matrix for linear codes and we present binning techniques for both linear and nonlinear codes using two different approaches: recursive and non-recursive. To our knowledge, this is the first optimization solution for secrecy coding obtained through linear programming. Our new bounds and codes mark a significant breakthrough towards understanding fundamental limits of performance (and how to achieve them in some instances) for the binary symmetric wiretap channel with real finite blocklength coding constructions. Our techniques are especially useful for codes of small to medium blocklength, such as those that may be required by applications with small payloads, such as the Internet of Things.
引用
收藏
页码:2450 / 2463
页数:14
相关论文
共 50 条
  • [31] Strong Secrecy of Arbitrarily Varying Wiretap Channel With Constraints
    Chen, Yiqi
    He, Dan
    Ying, Chenhao
    Luo, Yuan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (07) : 4700 - 4722
  • [32] On the ergodic secrecy capacity and secrecy outage probability of the MIMOME Rayleigh wiretap channel
    Guerreiro, Andre Saito
    Fraidenraich, Gustavo
    Souza, Richard Demo
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (01):
  • [33] Secrecy Capacity of the Ergodic Layered Erasure Wiretap channel
    Hossan, Mohammad K.
    Karmakar, Sanjay
    2015 49th Annual Conference on Information Sciences and Systems (CISS), 2015,
  • [34] Secrecy Capacity of the Extended Wiretap Channel II with Noise
    He, Dan
    Guo, Wangmei
    Luo, Yuan
    ENTROPY, 2016, 18 (11)
  • [35] Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel With a Confidential Component
    Gulcu, Talha Cihad
    Barg, Alexander
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (02) : 1311 - 1324
  • [36] A Channel-Enhancement Approach to the Secrecy Capacity of the Multiantenna Wiretap Channel
    Liu, Tie
    Shamai , Shlomo
    ITW: 2009 IEEE INFORMATION THEORY WORKSHOP ON NETWORKING AND INFORMATION THEORY, 2009, : 216 - +
  • [37] Sensitivity of the Secrecy Capacity of a Wiretap Channel to the Channel Gains with Imperfect Channel Information
    Sedighizad, Mahboobeh
    Bafghi, Hamid G.
    Seyfe, Babak
    2017 IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY (IWCIT), 2017,
  • [38] On the Secrecy Capacity of the MISO Wiretap Channel under Imperfect Channel Estimation
    Rezki, Zouheir
    Alomair, Basel
    Alouini, Mohamed-Slim
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1602 - 1607
  • [39] Polar Coding for the General Wiretap Channel
    Wei, Yi-Peng
    Ulukus, Sennur
    2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [40] Strong Secrecy Capacity of the Wiretap Channel II with DMC Main Channel
    He, Dan
    Luo, Yuan
    Cai, Ning
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 505 - 509