© The Institution of Engineering and Technology
In this study, a concatenated coding scheme based on Reed–Muller (RM) codes and bit-extension codes is proposed for equivocation of a wiretap channel. RM codes and their cosets are adopted for message encoding, and bit-extension codes are used to enhance the equivocation capability for a wiretapper's channel. The average equivocation is discussed when only RM codes are used in the system, and the probability causing imperfect secrecy is also determined. Analytical results show that the proposed code can be used for the equivocation capability of wiretap channels and suggest a proper management over a wiretap channel.
References
-
-
1)
-
5. Liu, R., Liang, Y., Poor, H.V., Spasojević, P.: ‘Secure nested codeds for type II wiretap channels’. Proc. Information Theory Workshop 2007, September 2007, pp. 337–342.
-
2)
-
2. Ozarow, L.H., Wyner, A.D.: ‘Wire-tap channel II’, Bell Syst. Tech. J., 1984, 63, (10), pp. 2135–2157.
-
3)
-
13. Kim, S.: ‘New codes with finite length for a wiretap channel’, Wirel. Pers. Commun., 2014, 75, (1), pp. 601–608 (doi: 10.1007/s11277-013-1380-9).
-
4)
-
7. Goldwasser, S., Micali, S.: ‘Probabilistic encryption’, J. Comput. Syst. Sci., 1984, 28, (2), pp. 270–299 (doi: 10.1016/0022-0000(84)90070-9).
-
5)
-
10. Mahdavifar, H., Vardy, A.: ‘Achieving the secrecy capacity of wiretap channels using polar codes’, IEEE Trans. Inf. Theory, 2011, 57, (10), pp. 6428–6443 (doi: 10.1109/TIT.2011.2162275).
-
6)
-
3. Wei, V.K.: ‘Generalized Hamming weights for linear codes’, IEEE Trans. Inf. Theory, 1991, 37, (5), pp. 1412–1418 (doi: 10.1109/18.133259).
-
7)
-
14. Kim, S., Nguyen, G.K., Hoang, T.M., Shin, H.: ‘Concatenated coding and hybrid automatic repeat request for wiretap channels’, IET Commun., 2014, 8, (8), pp. 1211–1216 (doi: 10.1049/iet-com.2013.0603).
-
8)
-
27. Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J.-M.: ‘Applications of LDPC codes to the wiretap channel’, IEEE Trans. Inf. Theory, 2008, 53, (8), pp. 2933–2945 (doi: 10.1109/TIT.2007.901143).
-
9)
-
1. Wyner, A.D.: ‘The wire-tap channel’, Bell Syst. Tech. J., 1975, 54, (8), pp. 1355–1387 (doi: 10.1002/j.1538-7305.1975.tb02040.x).
-
10)
-
9. Ling, C., Luzzi, L., Belfiore, J.-C., Stehlé, D.: ‘Semantically secure lattice codes for the Gaussian wiretap channel’, IEEE Trans. Inf. Theory, 2014, 60, (10), pp. 6399–6416 (doi: 10.1109/TIT.2014.2343226).
-
11)
-
6. Subramanian, A., Thangaraj, A., Bloch, M., McLaughlin, S.: ‘Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes’, IEEE Trans. Inf. Forensics Secur., 2011, 6, (3), pp. 585–594 (doi: 10.1109/TIFS.2011.2148715).
-
12)
-
16. MacWilliams, F.J., Sloane, N.J.A.: ‘The theory of error-correcting codes’ (North-Holland, Amsterdam, Netherlands, 1977).
-
13)
-
12. Thangaraj, A.: ‘Coding for wiretap channels: Channel resolvability and semantic security’. Proc. Information Theory Workshop, November 2014, pp. 232–236.
-
14)
-
11. Bloch, M., Laneman, J.: ‘Strong secrecy from channel resolvability’, IEEE Trans. Inf. Theory, 2013, 59, (12), pp. 8077–8098 (doi: 10.1109/TIT.2013.2283722).
-
15)
-
8. Bellare, M., Tessaro, S., Vardy, A.: ‘Semantic security for the wiretap channel’. Proc. CRYPTO'2012, (, 7417), 2012, pp. 294–311.
-
16)
-
15. Muller, D.: ‘Application of Boolean algebra to switching circuit design and to error detection’. IRE Trans. Electronic Computers, September 1954, pp. 6–12.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2014.1044
Related content
content/journals/10.1049/iet-com.2014.1044
pub_keyword,iet_inspecKeyword,pub_concept
6
6