Nested polar codes for wiretap and relay channels
We show that polar codes asymptotically achieve the whole capacity-equivocation region for
the wiretap channel when the wiretapper's channel is degraded with respect to the main …
the wiretap channel when the wiretapper's channel is degraded with respect to the main …
Error-control coding for physical-layer secrecy
The renewed interest for physical-layer security techniques has put forward a new role for
error-control codes. In addition to ensuring reliability, carefully designed codes have been …
error-control codes. In addition to ensuring reliability, carefully designed codes have been …
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density
parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using …
parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using …
Performance analysis and design of two edge-type LDPC codes for the BEC wiretap channel
We consider transmission over a wiretap channel where both the main channel and the
wiretapper's channel are binary erasure channels (BEC). A code construction method is …
wiretapper's channel are binary erasure channels (BEC). A code construction method is …
LDPC code construction for wireless physical-layer key reconciliation
J Etesami, W Henkel - 2012 1st IEEE International Conference …, 2012 - ieeexplore.ieee.org
The paper describes a reconciliation procedure for physical key generation based on
specially designed LDPC codes using Slepian-Wolf-type coding. The LDPC codes are …
specially designed LDPC codes using Slepian-Wolf-type coding. The LDPC codes are …
New dual relationships for error-correcting wiretap codes
M Shoushtari, WK Harrison - 2021 IEEE Information Theory …, 2021 - ieeexplore.ieee.org
In this paper, we consider the equivocation of finite blocklength coset codes when used over
binary erasure wiretap channels. We make use of the equivocation matrix in comparing …
binary erasure wiretap channels. We make use of the equivocation matrix in comparing …
Artificially noise-injected low-density parity-check codes for the gaussian wiretap channel
Wireless telemetry communication systems may be vulnerable to eavesdroppers due to their
broad-casting nature, which is a risk to confidential information transmission. This paper …
broad-casting nature, which is a risk to confidential information transmission. This paper …
Coding for the wiretap channel
M Andersson - 2011 - diva-portal.org
We consider code design for Wyner's wiretap channel. Optimal coding schemes for this
channel require an overall code that is capacity achieving for the main channel, partitioned …
channel require an overall code that is capacity achieving for the main channel, partitioned …
Regular LDPC codes on BMS wiretap channels: Security bounds
M Pathegama, A Barg - arxiv preprint arxiv:2502.06058, 2025 - arxiv.org
We improve the secrecy guarantees for transmission over general binary memoryless
symmetric wiretap channels that relies on regular LDPC codes. Previous works showed that …
symmetric wiretap channels that relies on regular LDPC codes. Previous works showed that …
Achieving secrecy: Capacity vs. resolvability
MR Bloch - 2011 IEEE International Symposium on Information …, 2011 - ieeexplore.ieee.org
In this paper, we investigate the nature of the coding mechanisms required to ensure strong
secrecy over wiretap channels. Specifically, we analyze the limitations of capacity-based …
secrecy over wiretap channels. Specifically, we analyze the limitations of capacity-based …