On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels

被引:0
|
作者
Torfi, Amirsina [1 ]
Soleymani, Sobhan [1 ]
Aram, Siamak [2 ]
Vakili, Vahid Tabataba [3 ]
机构
[1] West Virginia Univ, Dept Comp Sci & Elect Engn, Morgantown, WV 26506 USA
[2] Univ Maryland Baltimore Cty, Dept Epidemiol & Publ Hlth, Baltimore, MD 21228 USA
[3] Iran Univ Sci & Technol, Sch Elect Engn, Tehran, Iran
关键词
WIRETAP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since polar codes are capacity achieving codes with low encoding-decoding complexity and they can approach perfect secrecy rates for binary-input degraded wiretap channels in symmetric settings, they are investigated extensively in the literature recently. In this paper, a polar coding scheme to achieve secrecy capacity in non-symmetric binary input channels is proposed. The proposed scheme satisfies security and reliability conditions. The wiretap channel is assumed to be stochastically degraded with respect to the legitimate channel and message distribution is uniform. The information set is sent over channels that are good for Bob and bad for Eve. Random bits are sent over channels that are good for both Bob and Eve. A frozen vector is chosen randomly and is sent over channels bad for both. We prove that there exists a frozen vector for which the coding scheme satisfies reliability and security conditions and approaches the secrecy capacity. We further empirically show that in the proposed scheme for non-symmetric binary-input discrete memoryless channels, the equivocation rate achieves its upper bound in the whole capacity-equivocation region.
引用
收藏
页码:549 / 556
页数:8
相关论文
共 50 条
  • [21] Capacity-Achieving Codes for Noisy Feedback Channels: A Necessary Condition
    Li, Chong
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (06) : 1007 - 1010
  • [22] Capacity-achieving Polar-based LDGM Codes with Crowdsourcing Applications
    Pang, James
    Mahdavifar, Hessam
    Pradhan, S. Sandeep
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 449 - 454
  • [23] Existence and Construction of Capacity-Achieving Network Codes for Distributed Storage
    Wu, Yunnan
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1150 - 1154
  • [24] Existence and Construction of Capacity-Achieving Network Codes for Distributed Storage
    Wu, Yunnan
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (02) : 277 - 288
  • [25] On the Construction of Polar Codes
    Pedarsani, Ramtin
    Hassani, S. Hamed
    Tal, Ido
    Telatar, Emre
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 11 - 15
  • [26] New Construction and Performance Analysis of Polar Codes over AWGN Channels
    Tahir, Bashar
    Rupp, Markus
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [27] Beyond Double Transitivity: Capacity-Achieving Cyclic Codes on Erasure Channels
    Kumar, Santhosh
    Calderbank, Robert
    Pfister, Henry D.
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [28] Multi-source operator channels: Efficient capacity-achieving codes
    Yao, Hongyi
    Dikaliotis, Theodoros K.
    Jaggi, Sidharth
    Ho, Tracey
    2010 IEEE INFORMATION THEORY WORKSHOP (ITW), 2010,
  • [29] Output Distributions of Capacity-Achieving Codes for Gaussian Multiple Access Channels
    Fong, Silas L.
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (05) : 938 - 941
  • [30] Capacity-Achieving Codes for Channels with Memory with Maximum-Likelihood Decoding
    Bae, Jung Hyun
    Anastasopoulos, Achilleas
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 586 - 590