Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes

被引:21
|
作者
Mahdavifar, Hessam [1 ]
Vardy, Alexander [1 ]
机构
[1] Univ Calif San Diego, La Jolla, CA 92093 USA
来源
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2010年
关键词
D O I
10.1109/ISIT.2010.5513514
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Suppose that Alice wishes to send messages to Bob through a communication channel C-1, but her transmissions also reach an eavesdropper Eve through another channel C-2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in terms of the ratio of Eve's equivocation about the message to its a priori entropy. Wyner showed that the situation is characterized by a single constant C-s, called the secrecy capacity, which has the foUowing meaning: for all epsilon > 0, there exist coding schemes of rate R >= C-s - epsilon that asymptotically achieve both the reliability and the security objectives. However, his proof of this result is based upon a nonconstructive random-coding argument. To date, despite a considerable research effort, the only case where we know how to construct codes that achieve secrecy capacity is when Eve's channel C-2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently introduced by Arikan. They achieve the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity of general wiretap channels. Our construction works for any instantiation of the wiretap channel model, as originally defined by Wyner, as long as both C-1 and C-2 are symmetric and binary-input.
引用
收藏
页码:913 / 917
页数:5
相关论文
共 50 条
  • [1] Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes
    Mahdavifar, Hessam
    Vardy, Alexander
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (10) : 6428 - 6443
  • [2] Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices
    Liu, Ling
    Yan, Yanfei
    Ling, Cong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) : 1647 - 1665
  • [3] Achieving Secrecy Capacity of MISO Fading Wiretap Channels with Artificial Noise
    Xiong, Qi
    Gong, Yi
    Liang, Ying-Chang
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 2452 - 2456
  • [4] Strong Secrecy for Relay Wiretap Channels with Polar Codes and Double-Chaining
    Athanasakos, Manos
    Karagiannidis, George
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [5] On the Secrecy Capacity of Arbitrary Wiretap Channels
    Bloch, Matthieu
    Laneman, J. Nicholas
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 818 - 825
  • [6] A Low-Complexity Algorithm for Achieving Secrecy Capacity in MIMO Wiretap Channels
    Thang Van Nguyen
    Quang-Doanh Vu
    Juntti, Markku
    Tran, Le-Nam
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] OPTIMAL INPUT COVARIANCE FOR ACHIEVING SECRECY CAPACITY IN GAUSSIAN MIMO WIRETAP CHANNELS
    Li, Jiangyuan
    Petropulu, Athina
    2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 3362 - 3365
  • [8] Achieving Secrecy without any Instantaneous CSI: Polar Coding for Fading Wiretap Channels
    Si, Hongbo
    Koyluoglu, O. Ozan
    Vishwanath, Sriram
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2161 - 2165
  • [9] On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels
    Torfi, Amirsina
    Soleymani, Sobhan
    Aram, Siamak
    Vakili, Vahid Tabataba
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 549 - 556
  • [10] Nested Polar Codes for Wiretap and Relay Channels
    Andersson, Mattias
    Rathi, Vishwambhar
    Thobaben, Ragnar
    Kliewer, Jorg
    Skoglund, Mikael
    IEEE COMMUNICATIONS LETTERS, 2010, 14 (08) : 752 - 754