Computer Science – Information Theory
Scientific paper
2010-03-06
Computer Science
Information Theory
Proceedings of the 21st Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2010),
Scientific paper
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Ar{\i}kan. It is shown that polar codes achieve non-trivial perfect secrecy rates for binary-input degraded wiretap channels while enjoying their low encoding-decoding complexity. In the special case of symmetric main and eavesdropper channels, this coding technique achieves the secrecy capacity. Next, fading erasure wiretap channels are considered and a secret key agreement scheme is proposed, which requires only the statistical knowledge of the eavesdropper channel state information (CSI). The enabling factor is the creation of advantage over Eve, by blindly using the proposed scheme over each fading block, which is then exploited with privacy amplification techniques to generate secret keys.
Gamal Hesham El
Koyluoglu Onur Ozan
No associations
LandOfFree
Polar Coding for Secure Transmission and Key Agreement does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Polar Coding for Secure Transmission and Key Agreement, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Polar Coding for Secure Transmission and Key Agreement will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-667388