2017 51st Annual Conference on Information Sciences and Systems (CISS) 2017
DOI: 10.1109/ciss.2017.7926162
|View full text |Cite
|
Sign up to set email alerts
|

Polar coding for achieving the capacity of marginal channels in nonbinary-input setting

Abstract: Achieving information-theoretic security using explicit coding scheme in which unlimited computational power for eavesdropper is assumed, is one of the main topics is security consideration. It is shown that polar codes are capacity achieving codes and have a low complexity in encoding and decoding. It has been proven that polar codes reach to secrecy capacity in the binary-input wiretap channels in symmetric settings for which the wiretapper's channel is degraded with respect to the main channel. The first ta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…In a wiretap channel, Alice sends messages to Bob through main channels, while an eavesdropper Eve receives the messages from wiretap channels. Wiretap polar coding is proposed to protect the communications between Alice and Bob in [9]. If the wiretap channel is stochastically degraded with respect to the main channel, Bob can recover the sent messages with high probability, whereas the probability that Eve can recover the message approaches zero [9].…”
Section: B Wiretap Polar Codingmentioning
confidence: 99%
See 4 more Smart Citations
“…In a wiretap channel, Alice sends messages to Bob through main channels, while an eavesdropper Eve receives the messages from wiretap channels. Wiretap polar coding is proposed to protect the communications between Alice and Bob in [9]. If the wiretap channel is stochastically degraded with respect to the main channel, Bob can recover the sent messages with high probability, whereas the probability that Eve can recover the message approaches zero [9].…”
Section: B Wiretap Polar Codingmentioning
confidence: 99%
“…Wiretap polar coding is proposed to protect the communications between Alice and Bob in [9]. If the wiretap channel is stochastically degraded with respect to the main channel, Bob can recover the sent messages with high probability, whereas the probability that Eve can recover the message approaches zero [9]. Let the transition matrices of the wiretap and main channels be W w and W m , respectively.…”
Section: B Wiretap Polar Codingmentioning
confidence: 99%
See 3 more Smart Citations