2023
DOI: 10.11591/ijeecs.v32.i2.pp804-810
|View full text |Cite
|
Sign up to set email alerts
|

Polar code-based cryptosystem: comparative study and analysis of efficiency

Ritu Redhu,
Ekta Narwal

Abstract: <p><span>This review paper aims to examine the use of polar codes in public key cryptosystems, providing a comprehensive overview of the state-of-the-art in this field at present. This study thoroughly searches databases such as IEEE Xplore, Scopus, and the ACM digital library to locate relevant research articles. In this study, we demonstrate the use of polar codes in public key cryptography and provide valuable insights for researchers interested in this field of research. The paper identifies se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 42 publications
0
4
0
Order By: Relevance
“…The proposed PKC-SPE cryptosystem is being compared to existing schemes 14 in this section. This section evaluates the efficacy and uniqueness of the PKC-SPE cryptosystem against similar existing schemes.…”
Section: Comparison With Similar Existing Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed PKC-SPE cryptosystem is being compared to existing schemes 14 in this section. This section evaluates the efficacy and uniqueness of the PKC-SPE cryptosystem against similar existing schemes.…”
Section: Comparison With Similar Existing Schemesmentioning
confidence: 99%
“…It is a crucial need that 5G approaches are designed to adopt PQC for public key cryptosystems. Post-quantum cryptographic applications may benefit from polar codes because of many characteristics: It is believed that polar codes are used in various cryptosystems because of their error-correcting abilities, low complexity, and encoding and decoding algorithms that are used to reduce the size of the cryptosystem’s keys 14 . SPE algorithms combine error-correction with the advantage of maintaining the original information bits in their systematic form.…”
Section: Introductionmentioning
confidence: 99%
“…A (N, K) Polar code (16) is a type of error-correcting code which is constructed by computing the Kronecker product of the kernel matrix…”
Section: Polar Codesmentioning
confidence: 99%
“…For the (16,8) Polar code, the Bhattacharyya parameters of the BSC with a crossover probability of 0.2494 are as follows: Z = [1.0000 1.0000 1.0000 0.9987 1.0000 0.9974 0.9950 0.8638 0.9628 0.6513 0.5300 0.0989] Among all Bhattacharyya parameters, the indices [8 10 11 12 13 14 15 16] correspond to the smallest value, known as Good-Bit Channels. The indices [1 2 3 4 5 6 7 9] corresponding to the largest value of the Bhattacharyya parameters are known as Bad-Bit Channels.…”
Section: The Proposed Padding Techniquesmentioning
confidence: 99%