Title :
Achieving the secrecy capacity of wiretap channels using Polar codes
Author :
Mahdavifar, Hessam ; Vardy, Alexander
Author_Institution :
Univ. of California San Diego, La Jolla, CA, USA
Abstract :
Suppose that Alice wishes to send messages to Bob through a communication channel C1, but her transmissions also reach an eavesdropper Eve through another channel C2. This is the wiretap channel model introduced by Wyner in 1975. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob´s probability of error in recovering the message, while security is measured in terms of the ratio of Eve´s equivocation about the message to its a priori entropy. Wyner showed that the situation is characterized by a single constant Cs, called the secrecy capacity, which has the following meaning: for all ε > 0, there exist coding schemes of rate R ≥ Cs - ε that asymptotically achieve both the reliability and the security objectives. However, his proof of this result is based upon a nonconstructive random-coding argument. To date, despite a considerable research effort, the only case where we know how to construct codes that achieve secrecy capacity is when Eve´s channel C2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently introduced by Arikan. They achieve the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. In this paper, we use polar codes to construct a coding scheme that achieves the secrecy capacity of general wiretap channels. Our construction works for any instantiation of the wiretap channel model, as originally defined by Wyner, as long as both C1 and C2 are symmetric and binary-input.
Keywords :
cryptography; error analysis; parity check codes; probability; reliability; telecommunication channels; LDPC codes; binary-input discrete memoryless channels; coding scheme design; combinatorial variation; communication channel reliability; entropy; error probability; nonconstructive random coding argument; polar codes; wiretap channels secrecy capacity; Channel capacity; Communication channels; Decoding; Degradation; Entropy; Helium; Information security; Monte Carlo methods; Random variables;
Conference_Titel :
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4244-7890-3
Electronic_ISBN :
978-1-4244-7891-0
DOI :
10.1109/ISIT.2010.5513514