Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes

被引:21
|
作者
Mahdavifar, Hessam [1 ]
Vardy, Alexander [1 ]
机构
[1] Univ Calif San Diego, La Jolla, CA 92093 USA
关键词
D O I
10.1109/ISIT.2010.5513514
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Suppose that Alice wishes to send messages to Bob through a communication channel C-1, but her transmissions also reach an eavesdropper Eve through another channel C-2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in terms of the ratio of Eve's equivocation about the message to its a priori entropy. Wyner showed that the situation is characterized by a single constant C-s, called the secrecy capacity, which has the foUowing meaning: for all epsilon > 0, there exist coding schemes of rate R >= C-s - epsilon that asymptotically achieve both the reliability and the security objectives. However, his proof of this result is based upon a nonconstructive random-coding argument. To date, despite a considerable research effort, the only case where we know how to construct codes that achieve secrecy capacity is when Eve's channel C-2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently introduced by Arikan. They achieve the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity of general wiretap channels. Our construction works for any instantiation of the wiretap channel model, as originally defined by Wyner, as long as both C-1 and C-2 are symmetric and binary-input.
引用
收藏
页码:913 / 917
页数:5
相关论文
共 50 条
  • [41] Achieving Secure Communication over Wiretap Channels Using the Error Exponent of the Polar Code
    Salehi, Mohammad Reza Deylam
    Tavakoli, Hassan
    ENGINEERING LETTERS, 2022, 30 (01)
  • [42] Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
    Shakiba-Herfeh, Mahdi
    Luzzi, Laura
    Chorti, Arsenia
    2021 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [43] On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT
    Lin, Shih-Chun
    Lin, Cheng-Liang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (06) : 3293 - 3306
  • [44] Secrecy Capacity of Two-Hop Relay Assisted Wiretap Channels
    Meysam Mirzaee
    Soroush Akhlaghi
    Wireless Personal Communications, 2017, 94 : 2901 - 2923
  • [45] The Secrecy Capacity of Gaussian MIMO Wiretap Channels Under Interference Constraints
    Dong, Limeng
    Loyka, Sergey
    Li, Yong
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 704 - 722
  • [46] Secrecy Capacity of Two-Hop Relay Assisted Wiretap Channels
    Mirzaee, Meysam
    Akhlaghi, Soroush
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2901 - 2923
  • [47] Secrecy-Good Polar Lattices with Optimal Shaping for the Gaussian Wiretap Channels
    Liu, Ling
    Yan, Yanfei
    Ling, Cong
    2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [48] Achieving Marton's Region for Broadcast Channels Using Polar Codes
    Mondelli, Marco
    Hassani, S. Hamed
    Urbanke, Ruediger
    Sason, Igal
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 306 - 310
  • [49] Achieving Marton's Region for Broadcast Channels Using Polar Codes
    Mondelli, Marco
    Hassani, Seyed Hamed
    Sason, Igal
    Urbanke, Ruediger L.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (02) : 783 - 800
  • [50] Capacity-Achieving Rateless Polar Codes
    Li, Bin
    Tse, David
    Chen, Kai
    Shen, Hui
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 46 - 50