Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming

被引:0
|
作者
Nikkhah, Ali [1 ,2 ]
Shoushtari, Morteza [3 ]
Akhbari, Bahareh [1 ]
Harrison, Willie K. [3 ]
机构
[1] KN Toosi Univ Technol, Fac Elect Engn, Tehran 1631714191, Iran
[2] Linkoping Univ, Dept Comp & Informat Sci, S-58183 Linkoping, Sweden
[3] Brigham Young Univ, Dept Elect & Comp Engn, Provo, UT 84602 USA
关键词
Secrecy coding; binary symmetric channel; wiretap channel; equivocation rate; finite blocklength codes; linear programming; LDPC CODES; SECURITY;
D O I
10.1109/TIFS.2025.3545301
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation when coding over a wiretap channel model where the main channel is noiseless and the eavesdropper's channel is a binary symmetric channel (BSC). Using this technique, we present a numerically-derived upper bound for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional infinite blocklength bounds. We also propose a secrecy coding technique that outperforms random binning codes. When there is one overhead bit, this coding technique is optimum and achieves the newly derived bound. For cases with additional bits of overhead, our coding scheme can achieve equivocation rates close to the new bound. Furthermore, we explore the patterns of the generator matrix and the parity-check matrix for linear codes and we present binning techniques for both linear and nonlinear codes using two different approaches: recursive and non-recursive. To our knowledge, this is the first optimization solution for secrecy coding obtained through linear programming. Our new bounds and codes mark a significant breakthrough towards understanding fundamental limits of performance (and how to achieve them in some instances) for the binary symmetric wiretap channel with real finite blocklength coding constructions. Our techniques are especially useful for codes of small to medium blocklength, such as those that may be required by applications with small payloads, such as the Internet of Things.
引用
收藏
页码:2450 / 2463
页数:14
相关论文
共 50 条
  • [21] Imperfect Secrecy in Wiretap Channel II
    Cheng, Fan
    Yeung, Raymond W.
    Shum, Kenneth W.
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012, : 71 - 75
  • [22] Enhancing secrecy rates in a wiretap channel
    Shahid M.Shah
    Vinod Sharma
    Digital Communications and Networks, 2020, 6 (01) : 129 - 135
  • [23] On the Secrecy Capacity Region of the Wiretap Broadcast Channel
    Benammar, Meryem
    Piantanida, Pablo
    2014 IEEE INFORMATION THEORY WORKSHOP (ITW), 2014, : 421 - 425
  • [24] Secrecy Capacity of the Degraded Poisson Wiretap Channel
    Laourine, Amine
    Wagner, Aaron B.
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2553 - 2557
  • [25] On the Secrecy Capacity of Fading Gaussian Wiretap Channel
    Hossan, Md. K.
    Karmakar, S.
    Ghosh, A.
    2015 IEEE 14TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2015, : 36 - 40
  • [26] Performance analysis of FSO/CDMA system based on binary symmetric wiretap channel
    Ji, Jianhua
    Chen, Xuemei
    Huang, Qian
    IET COMMUNICATIONS, 2019, 13 (01) : 116 - 123
  • [27] On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation
    Rezki, Zouheir
    Khisti, Ashish
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (10) : 3652 - 3664
  • [28] Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes
    Subramanian, Arunkumar
    Thangaraj, Andrew
    Bloch, Matthieu
    McLaughlin, Steven W.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 585 - 594
  • [29] CODING FOR THE BINARY SYMMETRIC BROADCAST CHANNEL WITH 2 RECEIVERS
    KASAMI, T
    LIN, S
    WEI, VK
    YAMAMURA, S
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (05) : 616 - 625
  • [30] On an upper bound of the secrecy capacity for a general wiretap channel
    Koga, H
    Sato, N
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1641 - 1645