2018
DOI: 10.1109/lcomm.2018.2810888
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Transmission Scheme Based on 2-D Polar Coding Over Block Fading Wiretap Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…In [23], a concatenated coding scheme combining polar codes and fountain codes is proposed by Yang and Zhuang for memoryless erasure binary eavesdropping channel models, while relying on finite code lengths for ensuring security. Hao et al [33] discuss a secure transmission scheme employing two-dimensional polar codes designed for block fading eavesdropping channels, in the face of instantaneous secrecy capacity fluctuations. Bao et al [24] combine polar codes with artificial noise to derive upper and lower bounds of the symmetric capacity for polarized bit channels, which benefit the legitimate receiver but not the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…In [23], a concatenated coding scheme combining polar codes and fountain codes is proposed by Yang and Zhuang for memoryless erasure binary eavesdropping channel models, while relying on finite code lengths for ensuring security. Hao et al [33] discuss a secure transmission scheme employing two-dimensional polar codes designed for block fading eavesdropping channels, in the face of instantaneous secrecy capacity fluctuations. Bao et al [24] combine polar codes with artificial noise to derive upper and lower bounds of the symmetric capacity for polarized bit channels, which benefit the legitimate receiver but not the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…Polar codes have excellent performance and special constructions due to their nested codeword structure [17] which can realize random binning [18] in PLS coding. Therefore, many scholars have applied polar codes to the model of wiretapping channel [19], [19]- [21], which promotes further development of PLS coding theory. Moreover, chaotic encryption is one of the important way to implement PLS.…”
Section: Introductionmentioning
confidence: 99%