DocumentCode :
1340288
Title :
Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes
Author :
Mahdavifar, Hessam ; Vardy, Alexander
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of California San Diego, La Jolla, CA, USA
Volume :
57
Issue :
10
fYear :
2011
Firstpage :
6428
Lastpage :
6443
Abstract :
Suppose that Alice wishes to send messages to Bob through a communication channel C1, but her transmissions also reach an eavesdropper Eve through another channel C2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob´s probability of error in recovering the message, while security is measured in terms of the mutual information between the message and Eve´s observations. Wyner showed that the situation is characterized by a single constant Cs, called the secrecy capacity, which has the following meaning: for all ε >; 0, there exist coding schemes of rate R ≥ Cs-ε that asymptotically achieve the reliability and security objectives. However, his proof of this result is based upon a random-coding argument. To date, despite consider able research effort, the only case where we know how to construct coding schemes that achieve secrecy capacity is when Eve´s channel C2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently invented by Arikan; they approach the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity for a wide range of wiretap channels. Our construction works for any instantiation of the wiretap channel model, as long as both C1 and C2 are symmetric and binary-input, and C2 is degraded with respect to C1. Moreover, we show how to modify our construction in order to provide strong security, in the sense defined by Maurer, while still operating at a rate that approaches the secrecy capacity. In this case, we cannot guarantee that the reliability condition will also be satisfied unless the m- - ain channel C1 is noiseless, although we believe it can be always satisfied in practice.
Keywords :
binary codes; channel coding; decoding; probability; random codes; telecommunication channels; telecommunication network reliability; telecommunication security; Bob probability error; coding scheme design; combinatorial variation; communication channel; decoding complexity; eavesdropper Eve; encoding complexity; erasure channel; mutual information; polar code; random-coding argument; reliability objective; secrecy capacity; symmetric binary-input discrete memoryless channel; wiretap channel model; Argon; Channel capacity; Decoding; Encoding; Monte Carlo methods; Reliability; Security; Channel polarization; information-theoretic security; polar codes; secrecy capacity; strong security; wiretap channel;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2011.2162275
Filename :
6034749
Link To Document :
بازگشت