2009 IEEE Information Theory Workshop 2009
DOI: 10.1109/itw.2009.5351456
|View full text |Cite
|
Sign up to set email alerts
|

LDPC codes for the Gaussian wiretap channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
103
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(103 citation statements)
references
References 23 publications
0
103
0
Order By: Relevance
“…Since systematic transmission yields large security gaps, in [3,10,11], the use of punctured codes is proposed, by associating the secret bits to punctured bits. As shown in [12][13][14], an alternative solution is to scramble the information bits prior to encoding them.…”
Section: Fig 2 Wire-tap Channel Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Since systematic transmission yields large security gaps, in [3,10,11], the use of punctured codes is proposed, by associating the secret bits to punctured bits. As shown in [12][13][14], an alternative solution is to scramble the information bits prior to encoding them.…”
Section: Fig 2 Wire-tap Channel Modelmentioning
confidence: 99%
“…As a metric for PLS, we use a parameter which allows for a straightforward assessment and comparison of practical transmission schemes, based on the error rate achieved by Bob and Eve. This parameter is the so-called security gap, first introduced in [3]. It is defined as the quality ratio between Bob's and Eve's channels that is required to achieve a sufficient level of PLS, while ensuring that Bob reliably receives the transmitted information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a danger in adopting other less rigorous measures to make secrecy guarantees in general, as there is often no direct mapping from the information-theoretic measures to measures such as bit error rate (BER) [9], [10] or degrees of freedom [4] in a decoder. However, in the spirit of computational security and/or semantic security, we can still make guarantees on secrecy as long as the eavesdropper is constrained to a known set of decoders as done in [9], [10].…”
Section: Physical-layer Security Measuresmentioning
confidence: 99%
“…However, in the spirit of computational security and/or semantic security, we can still make guarantees on secrecy as long as the eavesdropper is constrained to a known set of decoders as done in [9], [10]. Over the BEC it is known that the MP decoder performs sub-optimally in general compared to the ML decoder.…”
Section: Physical-layer Security Measuresmentioning
confidence: 99%