Polar Coding for the Wiretap Broadcast Channel with Multiple Messages

被引:0
作者
del Olmo Alos, Jaume [1 ]
Fonollosa, Javier R. [1 ]
机构
[1] Univ Politecn Cataluna, Barcelona, Spain
来源
2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2020年
关键词
SECRECY CAPACITY; REGION;
D O I
10.1109/isit44484.2020.9174013
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eavesdropper. We consider a model in which the transmitter wishes to to reliably send different confidential and private messages to the different legitimate receivers, and the confidential message must also be (strongly) secured from the eavesdropper. There are two different inner-bounds on the achievable region of this model in the literature. Both are characterized by using Marton's coding and the only difference between them is the decoding strategy: one is characterized by using joint decoding, while the other uses successive decoding. In this paper we present a polar coding scheme that achieves the larger inner-bound, and we show that polar-based joint decoding is crucial for this purpose. A full version of this paper is accessible at: https://arxiv.org/abs/1909.04898
引用
收藏
页码:431 / 436
页数:6
相关论文
共 50 条
  • [31] A Perspective on the MIMO Wiretap Channel
    Oggier, Frederique
    Hassibi, Babak
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1874 - 1882
  • [32] The Degraded Poisson Wiretap Channel
    Laourine, Amine
    Wagner, Aaron B.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (12) : 7073 - 7085
  • [33] Decomposing the MIMO Wiretap Channel
    Khina, Anatoly
    Kochman, Yuval
    Khisti, Ashish
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 206 - 210
  • [34] Wiretap channel with side information
    Chen, Yanling
    Vinck, A. J. Han
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 395 - 402
  • [35] Semantic Security for the Wiretap Channel
    Bellare, Mihir
    Tessaro, Stefano
    Vardy, Alexander
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 294 - 311
  • [36] Non-Adaptive Coding for Two-Way Wiretap Channel With or Without Cost Constraints
    Hayashi, Masahito
    Chen, Yanling
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (07) : 4611 - 4633
  • [37] The Wiretap Channel With Feedback: Encryption Over the Channel
    Lai, Lifeng
    El Gamal, Hesham
    Poor, H. Vincent
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) : 5059 - 5067
  • [38] The Capacity Region of the Two-Receiver Gaussian Vector Broadcast Channel With Private and Common Messages
    Geng, Yanlin
    Nair, Chandra
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (04) : 2087 - 2104
  • [39] Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers
    Yang, Jun
    Kim, Il-Min
    Kim, Dong In
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (06) : 2840 - 2852
  • [40] Bayesian Game Formulation of Power Allocation in Multiple Access Wiretap Channel with Incomplete CSI
    Rashid, Basharat
    Haddad, Majed
    Shah, Shahid M.
    2024 NATIONAL CONFERENCE ON COMMUNICATIONS, NCC, 2024,