An Improved Feedback Coding Scheme for the Wire-tap Channel

12/13/2017
by   Bin Dai, et al.
0

Secure and reliable transmission over communication channels is first characterized by Wyner's wiretap channel (WTC) model. In recent years, the WTC with noiseless feedback (WTC-NF) attracts a lot attention, and it has been shown that the legal receiver's feedback enlarges the secrecy capacity of the WTC. Even so, the current feedback strategy for the WTC mainly focuses on generating key used for encrypting the transmitted message, and this strategy does not achieve the secrecy capacity of the WTC-NF. In this paper, a new coding strategy for the WTC-NF is presented. Besides used for generating key, the legal receiver's feedback of this new strategy is also used to produced a help information which helps the legal receiver to ameliorate his decoding performance. For the WTC-NF, the proposed new feedback strategy is shown to be better than the already existing one, and a binary example is given to further explain these results.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/10/2018

Feedback Coding Schemes for the Broadcast Channel with Mutual Secrecy Requirement

Recently, the physical layer security (PLS) of the communication systems...
research
05/29/2018

The Secure Two-Receiver Broadcast Channel With One-Sided Receiver Side Information

This paper studies the problem of secure communcation over the two-recei...
research
07/15/2020

How to apply the rubber method for channels with feedback

We give an overview of applications of the rubber method. The rubber met...
research
09/19/2022

The Secrecy Capacity of The Gaussian Wiretap Channel with Rate-Limited Help

The Gaussian wiretap channel with rate-limited help, available at the le...
research
11/10/2022

On the Capacity of "Beam-Pointing" Channels with Block Memory and Feedback: The Binary Case

Millimeter-wave (mmWave) communication is one of the key enablers for 5G...
research
01/12/2018

A Simplified Coding Scheme for the Broadcast Channel with Complementary Receiver Side Information under Individual Secrecy Constraints

This paper simplifies an existing coding scheme for the two-receiver dis...
research
08/05/2023

Secure Deep-JSCC Against Multiple Eavesdroppers

In this paper, a generalization of deep learning-aided joint source chan...

Please sign up or login with your details

Forgot password? Click here to reset