2011
DOI: 10.1109/tifs.2011.2139208
|View full text |Cite
|
Sign up to set email alerts
|

Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel

Abstract: The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the source can transmit only binary phase shift keyed (BPSK) symbols, and symbol-by-symbol hard-decision quantization is applied to the received symbols of the destination. An erro… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(29 citation statements)
references
References 35 publications
0
29
0
Order By: Relevance
“…Indeed, as reconciliation of continuous variables is not needed, it can be effectively implemented through standard soft decoding techniques of a binary code in an additive white Gaussian noise (AWGN) channel with binary input. For instance, [23] employs fixed LDPC codes with syndrome transmission on the public feedback channel.…”
Section: Practical Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, as reconciliation of continuous variables is not needed, it can be effectively implemented through standard soft decoding techniques of a binary code in an additive white Gaussian noise (AWGN) channel with binary input. For instance, [23] employs fixed LDPC codes with syndrome transmission on the public feedback channel.…”
Section: Practical Solutionmentioning
confidence: 99%
“…Indeed, LDPC codes are state-of-the-art error correcting codes, characterized by soft decoding algorithms able to approach the unconstrained channel capacity, with limited complexity. They have al- ready found several applications in physical-layer security, either as codes for near-optimal information reconciliation in secret-key agreement schemes [8,9,23], or as codes for secure communication over wiretap channels [3,14]. In order to assess the merit of the practical solution we also consider as performance metric the security gap defined as the ratio between the legitimate and eavesdropper signal to noise ratio (SNR) which allows reliable decoding for the legitimate receiver, while keeping the eavesdropper bit error rate (BER) and frame error rate (FER) sufficiently close to 0.5 and 1, respectively.…”
mentioning
confidence: 99%
“…LDPC for the Gaussian wiretap channel was suggested in [23], as well as in [24] to suggest secret sharing schemes. LDPCs were also used to allow strong secrecy over a binary erasure channel in [25].…”
Section: Secret Key Agreement Network and Practical Schemesmentioning
confidence: 99%
“…Recently, the Gaussian wiretap channel with constrained/finite inputs has attracted increasing research attention [4][5][6][7][8]. The closed-form expression of the secrecy capacity of the Gaussian wiretap channel with continuous input signal was given in [9].…”
Section: Introductionmentioning
confidence: 99%