Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LDPC Codes over Gaussian Multiple Access Wiretap Channel

Abstract: We study the problem of two-user Gaussian multiple access channel (GMAC) in the presence of an external eavesdropper. In this problem, an eavesdropper receives a signal with a lower signal-to-noise ratio (SNR) compared to the legitimate receiver and all transmitted messages should be kept confidential against the eavesdropper. For this purpose, we propose a secure coding scheme on thi...

متن کامل

Lattice Codes for the Gaussian Wiretap Channel

We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve’s probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice code...

متن کامل

A coding theorem for secret sharing communication systems with two Gaussian wiretap channels

A coding theorem is proved for the secret sharing communication system (SSCS) with two Gaussian wiretap channels. This communication system is an extension of both the SSCS with two noiseless channels and the Gaussian wiretap channel (GWC). The admissible region of rates and security levels for the SSCS with two GWC’s is described by the capacities and secrecy capacities of two GWC’s.

متن کامل

LDPC-Based Code Hopping for Gaussian Wiretap Channel With Limited Feedback

This paper presents a scheme named code hopping (CodeHop) for gaussian wiretap channels based on nonsystematic low-density parity-check (LDPC) codes. Different from traditional communications, in the CodeHop scheme, the legitimate receiver (Bob) rapidly switches the parity-check matrix upon each correctly received source message block. Given an authenticated public feedback channel, the transmi...

متن کامل

LDPC-BASED SECRET-SHARING SCHEMES FOR WIRETAP CHANNELS By CHAN WONG WONG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy LDPC-BASED SECRET-SHARING SCHEMES FOR WIRETAP CHANNELS By Chan Wong Wong December 2011 Chair: John M. Shea Cochair: Tan F. Wong Major: Electrical and Computer Engineering This dissertation examines the practical design of secret-sharing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2011

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2011.2139208