2011
DOI: 10.1109/tifs.2011.2134093
|View full text |Cite
|
Sign up to set email alerts
|

LDPC Codes for the Gaussian Wiretap Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
160
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 219 publications
(160 citation statements)
references
References 20 publications
0
160
0
Order By: Relevance
“…Since systematic transmission yields large security gaps, in [3,10,11], the use of punctured codes is proposed, by associating the secret bits to punctured bits. As shown in [12][13][14], an alternative solution is to scramble the information bits prior to encoding them.…”
Section: Fig 2 Wire-tap Channel Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Since systematic transmission yields large security gaps, in [3,10,11], the use of punctured codes is proposed, by associating the secret bits to punctured bits. As shown in [12][13][14], an alternative solution is to scramble the information bits prior to encoding them.…”
Section: Fig 2 Wire-tap Channel Modelmentioning
confidence: 99%
“…However, previous works in this line of research have mostly been focused on flat AWGN channels. In [3,10,11], it has been shown that an effective way of reducing the security gap consists in using punctured LDPC codes over these channels. On the other hand, the use of punctured codes brings the disadvantage of an increase in the power consumption.…”
Section: Introductionmentioning
confidence: 99%
“…LDPC for the Gaussian wiretap channel was suggested in [23], as well as in [24] to suggest secret sharing schemes. LDPCs were also used to allow strong secrecy over a binary erasure channel in [25].…”
Section: Secret Key Agreement Network and Practical Schemesmentioning
confidence: 99%
“…In this context, an important parameter is the difference between the qualities of the main and eavesdropper's channels (dubbed as security gap) needed for achieving physical layer security [7]. Small security gaps are desirable because they make physical layer security achievable even with a small degradation of the eavesdropper's channel with respect to the main one.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, punctured LDPC codes are exploited for physical layer security in [7]. Furthermore, [8] demonstrates that using nonsystematic codes obtained from scrambling information bits of a systematic code are quite effective to reduce the security gap, while [9] applies different techniques including scrambling, concatenation, and hybrid automatic repeat-request to LDPC and BCH codes in order to further reduce the security gap.…”
Section: Introductionmentioning
confidence: 99%