We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require an overall code that is capacity achieving for the main channel, partitioned into smaller subcodes, all of which are capacity achieving for the wiretapper’s channel. To accomplish this we introduce two edge type low density parity check (LDPC) ensembles for the wiretap channel. For the scenario when the main channel is error free and the wiretapper’s channel is a binary erasure channel (BEC) we find secrecy capacity achieving code sequences based on standard LDPC code sequences for the BEC. However, this construction does not work when there are also erasures on the main channel. For this case we develop a method based on linear programming ...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
The wiretap coding problem has been addressed since a long time from an information theoretic stand...
International audienceWe investigate properties of finite blocklength codes and their duals when use...
We consider transmission over a binary erasure wiretap channel using the code construction method in...
We consider transmission over a wiretap channel where both the main channel and the wiretapper's cha...
International audienceWith the advent of quantum key distribution (QKD) systems, perfect (i.e. infor...
Abstract—We show that duals of certain low-density parity-check (LDPC) codes, when used in a standar...
Summarization: In this work we consider the problem of achieving information-theoretic security with...
Abstract—In the wiretap channel model, symbols transmitted through a main channel to a legitimate re...
Abstract—A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to sen...
The objective of this chapter is to study practical coding techniques to provide security to wireles...
The ensemble of low-density generator-matrix/low-density parity-check (LDGM-LDPC) codes has been pro...
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destin...
In this work we study the reliability and secrecy performance achievable by practical low-density p...
Abstract—We show that duals of certain low-density parity-check (LDPC) codes, when used in a standar...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
The wiretap coding problem has been addressed since a long time from an information theoretic stand...
International audienceWe investigate properties of finite blocklength codes and their duals when use...
We consider transmission over a binary erasure wiretap channel using the code construction method in...
We consider transmission over a wiretap channel where both the main channel and the wiretapper's cha...
International audienceWith the advent of quantum key distribution (QKD) systems, perfect (i.e. infor...
Abstract—We show that duals of certain low-density parity-check (LDPC) codes, when used in a standar...
Summarization: In this work we consider the problem of achieving information-theoretic security with...
Abstract—In the wiretap channel model, symbols transmitted through a main channel to a legitimate re...
Abstract—A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to sen...
The objective of this chapter is to study practical coding techniques to provide security to wireles...
The ensemble of low-density generator-matrix/low-density parity-check (LDGM-LDPC) codes has been pro...
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destin...
In this work we study the reliability and secrecy performance achievable by practical low-density p...
Abstract—We show that duals of certain low-density parity-check (LDPC) codes, when used in a standar...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
The wiretap coding problem has been addressed since a long time from an information theoretic stand...
International audienceWe investigate properties of finite blocklength codes and their duals when use...