# Applications of LDPC Codes to the Wiretap Channel

@article{Thangaraj2007ApplicationsOL, title={Applications of LDPC Codes to the Wiretap Channel}, author={Andrew Thangaraj and Souvik Dihidar and A. Robert Calderbank and Steven W. McLaughlin and Jean-Marc Merolla}, journal={IEEE Transactions on Information Theory}, year={2007}, volume={53}, pages={2933-2945} }

With the advent of quantum key distribution (QKD) systems, perfect (i.e., information-theoretic) security can now be achieved for distribution of a cryptographic key. [...] Key Method We also consider binary erasure channel and binary symmetric channel special cases for the wiretap channel and propose specific practical codes. In some cases our designs achieve the secrecy capacity and in others the codes provide security at rates below secrecy capacity. For the special case of a noiseless main channel and… Expand

## Figures and Topics from this paper

## 408 Citations

On the construction of polar codes for achieving the capacity of marginal channels

- Computer Science, Mathematics2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
- 2017

It is proved that there exists a frozen vector for which the coding scheme satisfies reliability and security conditions and approaches the secrecy capacity, and empirically show that in the proposed scheme for non-symmetric binary-input discrete memoryless channels, the equivocation rate achieves its upper bound in the whole capacity-equivocation region.

Build-in wiretap channel I with feedback and LDPC codes

- Computer ScienceJournal of Communications and Networks
- 2009

With the proposed approach, unconditionally-secure communication can be achieved through interactive communications, in which the legitimate partner can realize the secret information transmission without a pre-shared secret key even if the eavesdropper has better channel from the beginning.

Polar coding for secure transmission and key agreement

- Computer SciencePIMRC
- 2010

The attempt is to overcome this elusive task by employing the polar coding technique of Arikan, and it is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input degraded wiretap channels while enjoying their low encoding-decoding complexity.

Generating a Binary Symmetric Channel for Wiretap Codes

- Computer ScienceIEEE Transactions on Information Forensics and Security
- 2019

It is shown that there exists a threshold in signal-to-noise ratio (SNR) over a Gaussian channel, such that receivers experiencing SNR below the threshold have no practical hope of receiving information about the message when the three-stage coding technique is applied.

Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes

- Mathematics, Computer ScienceIEEE Transactions on Information Theory
- 2010

Polar codes are used to construct a coding scheme that achieves the secrecy capacity for a wide range of wiretap channels, and the construction works for any instantiation of the wiretap channel model, as long as both C1 and C2 are symmetric and binary-input, and C1 is degraded with respect to C1.

Polar coding for achieving the capacity of marginal channels in nonbinary-input setting

- Computer Science, Mathematics2017 51st Annual Conference on Information Sciences and Systems (CISS)
- 2017

It is proved that there exists a frozen vector for which the coding scheme satisfies reliability and security conditions and it is further shown that uniform distribution of the message is the necessary condition for achieving secrecy capacity.

Achieving the secrecy capacity of wiretap channels using Polar codes

- Computer ScienceISIT
- 2010

Polar codes are used to construct a coding scheme that achieves the secrecy capacity of general wiretap channels, as long as both C 1 and C 2 are symmetric and binary-input.

Random complex field code design for security over wiretap channels

- Computer Science2011 45th Annual Conference on Information Sciences and Systems
- 2011

This paper proposes a random complex field code (RCFC) design for wiretap channels that is systematic and flexible for any secrecy rate, and is the first one which provides a platform to tradeoff secrecy rate with the security performance.

EG-LDPC codes for the erasure wiretap channel

- Mathematics2010 National Conference On Communications (NCC)
- 2010

The wiretap channel model, proposed by Wyner, has been studied by various authors from the perspectives of security, reliability and cryptographic protocols. A basic theme of these discussions has…

Encrypted polar codes for wiretap channel

- Computer ScienceProceedings of 2012 2nd International Conference on Computer Science and Network Technology
- 2012

A novel construction method is proposed for achieving more large secrecy capacity of wiretap channel with polar codes by integrating encryption algorithm to the construction of polar code and proving the validity, reliability, and security of the proposed scheme in theory.

## References

SHOWING 1-10 OF 41 REFERENCES

The wire-tap channel

- Computer ScienceThe Bell System Technical Journal
- 1975

This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.

Theory of Error-correcting Codes

The field of channel coding started with Claude Shannon's 1948 landmark paper. Fifty years of efforts and invention have finally produced coding schemes that closely approach Shannon's channel…

Unconditionally Secure Key Agreement and the Intrinsic Conditional Information

- Computer ScienceIEEE Trans. Inf. Theory
- 1999

A new conditional mutual information measure is defined, the intrinsic conditional Mutual information between S and Y when given Z, denoted by I(X;Y/spl darr/Z), which is an upper bound on S(X, Y/spl par/Z).

Capacity-achieving sequences for the erasure channel

- Mathematics, Computer ScienceIEEE Trans. Inf. Theory
- 2002

It turns out that the right-regular sequence is c.a. in a much stronger sense than, e.g., the Tornado sequence, which explains why numerical optimization techniques tend to favor graphs with only one degree of check nodes.

On a special class of broadcast channels with confidential messages

- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1997

It is shown that Csiszar and Korner's (1978) characterization of a discrete memoryless channel (DMC)X/spl rarr/Y as being less noisy than the DMC X/spl rarr/Z is equivalent to the condition that the…

Wire-tap channel II

- Computer Science, PhysicsAT&T Bell Lab. Tech. J.
- 1984

The optimal trade-offs among the parameters K, N, and μ and the intruder's uncertainty H (H is the "conditional entropy" of the data given the μ intercepted channel bits) were found and a system exists with H ≈ K − l.

Generalized privacy amplification

- Computer ScienceIEEE Trans. Inf. Theory
- 1995

This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.

Efficient encoding of low-density parity-check codes

- Mathematics, Computer ScienceIEEE Trans. Inf. Theory
- 2001

It is shown how to exploit the sparseness of the parity-check matrix to obtain efficient encoders and it is shown that "optimized" codes actually admit linear time encoding.

Secret Key Agreement by Public Discussion from Common Information

- 2004

The problem of generating a shared secret key S by two parties knowing dependent random variables X and I’, respectively, but not sharing a secret key initially, is considered. An enemy who knows the…

Broadcast channels with confidential messages

- Mathematics, Computer ScienceIEEE Trans. Inf. Theory
- 1978

Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.