Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes

被引:21
|
作者
Mahdavifar, Hessam [1 ]
Vardy, Alexander [1 ]
机构
[1] Univ Calif San Diego, La Jolla, CA 92093 USA
关键词
D O I
10.1109/ISIT.2010.5513514
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Suppose that Alice wishes to send messages to Bob through a communication channel C-1, but her transmissions also reach an eavesdropper Eve through another channel C-2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in terms of the ratio of Eve's equivocation about the message to its a priori entropy. Wyner showed that the situation is characterized by a single constant C-s, called the secrecy capacity, which has the foUowing meaning: for all epsilon > 0, there exist coding schemes of rate R >= C-s - epsilon that asymptotically achieve both the reliability and the security objectives. However, his proof of this result is based upon a nonconstructive random-coding argument. To date, despite a considerable research effort, the only case where we know how to construct codes that achieve secrecy capacity is when Eve's channel C-2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently introduced by Arikan. They achieve the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity of general wiretap channels. Our construction works for any instantiation of the wiretap channel model, as originally defined by Wyner, as long as both C-1 and C-2 are symmetric and binary-input.
引用
收藏
页码:913 / 917
页数:5
相关论文
共 50 条
  • [21] On the Secrecy Capacity of Hybrid FSO-mmWave Wiretap Channels
    Tokgoz, Sezer C.
    Althunibat, Saud
    Miller, Scott L.
    Qaraqe, Khalid A.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) : 4073 - 4086
  • [22] Average Secrecy Capacity of Land Mobile Satellite Wiretap Channels
    An, Kang
    Line, Min
    Liang, Tao
    Ouyang, Jian
    Chen, Haiping
    2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2016,
  • [23] On the Secrecy Capacity of Rank-Deficient Compound Wiretap Channels
    Schaefer, Rafael F.
    Loyka, Sergey
    2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2015,
  • [24] On the Continuity of the Secrecy Capacity of Compound and Arbitrarily Varying Wiretap Channels
    Boche, Holger
    Schaefer, Rafael F.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2531 - 2546
  • [25] Achieving the Secrecy Capacity of the AWGN Wiretap Channel via Multilevel Coding
    Abotabl, Ahmed
    Nosratinia, Aria
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 894 - 901
  • [26] SECRECY CAPACITY OF WIRETAP CHANNELS WITH ADDITIVE COLORED GAUSSIAN NOISE
    Fujita, Hachiro
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 1877 - 1880
  • [27] The Secrecy Capacity of a Class of Parallel Gaussian Compound Wiretap Channels
    Liu, Tie
    Prabhakaran, Vinod
    Vishwanath, Sriram
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 116 - +
  • [28] A Case where Noise Increases the Secrecy Capacity of Wiretap Channels
    Souihli, Oussama
    Ohtsuki, Tomoaki
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 3276 - 3281
  • [29] On the Ergodic Secrecy Capacity of MIMO Wiretap Channels with Statistical CSI
    Girnyk, Maksym A.
    Vehkapera, Mikko
    Yuan, Jinhong
    Rasmussen, Lars K.
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 398 - 402
  • [30] Secrecy capacity of wiretap channels with the bit error rate criterion
    Matsumoto, Ryutaroh
    IEICE COMMUNICATIONS EXPRESS, 2016, 5 (10): : 384 - 386