Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve non-trivial perfect secrecy rates for binary-input degraded wiretap channels while enjoying their low encoding-decoding complexity. In the special case of symmetric main and eavesdropper channels, this coding technique achieves the secrecy capacity. Extension of the coding technique to the multiple-access channels with a degraded eavesdropper is discussed. Finally, fading eras...
In the next era of communications, where heterogeneous, asynchronous and ultra-low latency networks ...
In the next era of communications, where heterogeneous, asynchronous and ultra-low latency networks ...
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the c...
Wyner's work on wiretap channels and the recent works on information theoretic security are based o...
In this paper, we propose a polar coding scheme for secure communication over the multiple-input, si...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
Summarization: In this work we consider the problem of achieving information-theoretic security with...
In this paper, we consider the problem of polar coding for secure communications over the two-way wi...
Asymptotic secrecy-capacity achieving polar coding schemes are proposed for the memoryless degraded ...
Abstract—Information-theoretic work for wiretap channels is mostly based on random coding schemes. D...
Two polar coding schemes are proposed for the degraded broadcast channel under different reliabilit...
Wiretap channel introduced by Wyner [1] in 1975, consists of a transmitter with a confidential messa...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
In the next era of communications, where heterogeneous, asynchronous and ultra-low latency networks ...
In the next era of communications, where heterogeneous, asynchronous and ultra-low latency networks ...
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the c...
Wyner's work on wiretap channels and the recent works on information theoretic security are based o...
In this paper, we propose a polar coding scheme for secure communication over the multiple-input, si...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
Summarization: In this work we consider the problem of achieving information-theoretic security with...
In this paper, we consider the problem of polar coding for secure communications over the two-way wi...
Asymptotic secrecy-capacity achieving polar coding schemes are proposed for the memoryless degraded ...
Abstract—Information-theoretic work for wiretap channels is mostly based on random coding schemes. D...
Two polar coding schemes are proposed for the degraded broadcast channel under different reliabilit...
Wiretap channel introduced by Wyner [1] in 1975, consists of a transmitter with a confidential messa...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
In the next era of communications, where heterogeneous, asynchronous and ultra-low latency networks ...
In the next era of communications, where heterogeneous, asynchronous and ultra-low latency networks ...
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the c...