2010
DOI: 10.1109/lcomm.2010.08.100875
|View full text |Cite
|
Sign up to set email alerts
|

Nested Polar Codes for Wiretap and Relay Channels

Abstract: We show that polar codes asymptotically achieve the whole capacity-equivocation region for the wiretap channel when the wiretapper's channel is degraded with respect to the main channel, and the weak secrecy notion is used. Our coding scheme also achieves the capacity of the physically degraded receiver-orthogonal relay channel. We show simulation results for moderate block length for the binary erasure wiretap channel, comparing polar codes and two edge type LDPC codes.© 2010 IEEE. Personal use of this materi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
148
3

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 157 publications
(151 citation statements)
references
References 11 publications
0
148
3
Order By: Relevance
“…While in this paper we have only considered the case of passive eavesdropping, the proposed framework can also be applied in cases where clients tamper with the data given that the effect of such attacks can be modelled in the design of the underlying wiretap codes. This can be achieved by adopting, e.g., polar code designs (see, e.g., [6]- [8]) to the resulting wiretap channel model. However, in contrast to the scheme proposed in this paper, this approach would not provide perfect secrecy for finite block length.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…While in this paper we have only considered the case of passive eavesdropping, the proposed framework can also be applied in cases where clients tamper with the data given that the effect of such attacks can be modelled in the design of the underlying wiretap codes. This can be achieved by adopting, e.g., polar code designs (see, e.g., [6]- [8]) to the resulting wiretap channel model. However, in contrast to the scheme proposed in this paper, this approach would not provide perfect secrecy for finite block length.…”
Section: Discussionmentioning
confidence: 99%
“…For k 0 = e B , reliability follows immediately from the MDS (maximumdistance separable) property of the fine code C 0 . Furthermore, from Lemma IV.1 in [6] we know that…”
Section: Channel Coding For the Wiretap Channelmentioning
confidence: 98%
See 1 more Smart Citation
“…Let W 1 and W 2 be two symmetric binary input memoryless channels, and let W 2 be degraded with respect to W 1 . Denote the polarized channels as defined in (1) The following result for degraded wiretap channels [19] was shown in [13][14][15][16]:…”
Section: Polar Codesmentioning
confidence: 99%
“…Polar codes were introduced by Arıkan and were shown to be capacity achieving for a large class of channels in [9,10]. They have been further studied for a large range of multi-user channels in [11][12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%