Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes

被引:21
|
作者
Mahdavifar, Hessam [1 ]
Vardy, Alexander [1 ]
机构
[1] Univ Calif San Diego, La Jolla, CA 92093 USA
关键词
D O I
10.1109/ISIT.2010.5513514
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Suppose that Alice wishes to send messages to Bob through a communication channel C-1, but her transmissions also reach an eavesdropper Eve through another channel C-2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in terms of the ratio of Eve's equivocation about the message to its a priori entropy. Wyner showed that the situation is characterized by a single constant C-s, called the secrecy capacity, which has the foUowing meaning: for all epsilon > 0, there exist coding schemes of rate R >= C-s - epsilon that asymptotically achieve both the reliability and the security objectives. However, his proof of this result is based upon a nonconstructive random-coding argument. To date, despite a considerable research effort, the only case where we know how to construct codes that achieve secrecy capacity is when Eve's channel C-2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently introduced by Arikan. They achieve the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity of general wiretap channels. Our construction works for any instantiation of the wiretap channel model, as originally defined by Wyner, as long as both C-1 and C-2 are symmetric and binary-input.
引用
收藏
页码:913 / 917
页数:5
相关论文
共 50 条
  • [31] Secrecy Capacity of Wiretap Channels with Additive Colored Gaussian Noise
    Fujita, Hachiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (06) : 1276 - 1287
  • [32] On the Continuity of the Secrecy Capacity of Wiretap Channels Under Channel Uncertainty
    Boche, Holger
    Schaefer, Rafael F.
    Poor, H. Vincent
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 4163 - 4168
  • [33] Strong Secrecy on a Class of Degraded Broadcast Channels Using Polar Codes
    del Olmo, Jaume
    Rodriguez Fonollosa, Javier
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 601 - 605
  • [34] Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel With a Confidential Component
    Gulcu, Talha Cihad
    Barg, Alexander
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (02) : 1311 - 1324
  • [35] Achieving Secrecy Capacity of the Wiretap Channel and Broadcast Channel with a Confidential Component
    Gulcu, Talha Cihad
    Barg, Alexander
    2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [36] Strong Secrecy on a Class of Degraded Broadcast Channels Using Polar Codes
    del Olmo Alos, Jaume
    Rodriguez Fonollosa, Javier
    ENTROPY, 2018, 20 (06)
  • [37] A Feedback-based Secrecy Coding Scheme Using Polar Code over Wiretap Channels
    Song, Liuyihan
    Xie, Lei
    Chen, Huifang
    Wang, Kuang
    2014 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2014,
  • [38] Capacity-Achieving Rate-Compatible Polar Codes for General Channels
    Mondelli, Marco
    Hassani, S. Hamed
    Maric, Ivana
    Hui, Dennis
    Hong, Song-Nam
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2017,
  • [39] Hierarchical Polar Coding for Achieving Secrecy Over State-Dependent Wiretap Channels Without Any Instantaneous CSI
    Si, Hongbo
    Koyluoglu, Onur Ozan
    Vishwanath, Sriram
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (09) : 3609 - 3623
  • [40] Achieving the Capacity of any DMC using only Polar Codes
    Sutter, David
    Renes, Joseph M.
    Dupuis, Frederic
    Renner, Renato
    2012 IEEE INFORMATION THEORY WORKSHOP (ITW), 2012, : 114 - 118