메뉴 건너뛰기




Volumn 30, Issue 5, 2013, Pages 41-50

Coding for secrecy: An overview of error-control coding techniques for physical-layer security

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK LAYERS; SIGNAL PROCESSING; STOCHASTIC SYSTEMS;

EID: 85032751057     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2013.2265141     Document Type: Review
Times cited : (179)

References (30)
  • 2
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • A. O. Hero, "Secure space-time communication," IEEE Trans. Inform. Theory, vol. 49, no. 12, pp. 3235-3249, 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.O.1
  • 3
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 5
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 6
    • 79952383608 scopus 로고    scopus 로고
    • Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas
    • X. He and A. Yener, "Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas," in Proc. 48th Annu. Allerton Conf. Commun., Control, and Computing, 2010, pp. 1228-1235.
    • (2010) Proc. 48th Annu. Allerton Conf. Commun., Control, and Computing , pp. 1228-1235
    • He, X.1    Yener, A.2
  • 14
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J. (before 1984), vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. (Before 1984) , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 15
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Advances in Cryptology-EUROCRYPT 2000 Bruges, Belgium: Springer-Verlag
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology-EUROCRYPT 2000 (Lecture Notes in Computer Science, vol. 1807), Bruges, Belgium: Springer-Verlag, pp. 351-368.
    • Lecture Notes in Computer Science , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 17
    • 84865478919 scopus 로고    scopus 로고
    • Semantic security for the wiretap channel
    • Advances in Cryptology-CRYPTO 2012 Berlin, Heidelberg, Germany: Springer-Verlag
    • M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology-CRYPTO 2012 (Lecture Notes in Computer Science, vol. 7417). Berlin, Heidelberg, Germany: Springer-Verlag, pp. 294-311.
    • Lecture Notes in Computer Science , vol.7417 , pp. 294-311
    • Bellare, M.1    Tessaro, S.2    Vardy, A.3
  • 19
    • 67650099990 scopus 로고    scopus 로고
    • Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels
    • July
    • E. Arikan, "Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels," IEEE Trans. Inform. Theory, vol. 55, no. 7, pp. 3051-3073, July 2009.
    • (2009) IEEE Trans. Inform. Theory , vol.55 , Issue.7 , pp. 3051-3073
    • Arikan, E.1
  • 20
    • 79251496645 scopus 로고    scopus 로고
    • Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC
    • S. Kudekar, T. J. Richardson, and R. L. Urbanke, "Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC," IEEE Trans. Inform. Theory, vol. 57, no. 2, pp. 803-834, 2011.
    • (2011) IEEE Trans. Inform. Theory , vol.57 , Issue.2 , pp. 803-834
    • Kudekar, S.1    Richardson, T.J.2    Urbanke, R.L.3
  • 21
    • 84872536384 scopus 로고    scopus 로고
    • Performance analysis and design of two edge-type LDPC codes for the BEC wiretap channel
    • Feb.
    • V. Rathi, M. Andersson, R. Thobaben, J. Kliewer, and M. Skoglund, "Performance analysis and design of two edge-type LDPC codes for the BEC wiretap channel," IEEE Trans. Inform. Theory, vol. 59, no. 2, pp. 1048-1064, Feb. 2013.
    • (2013) IEEE Trans. Inform. Theory , vol.59 , Issue.2 , pp. 1048-1064
    • Rathi, V.1    Andersson, M.2    Thobaben, R.3    Kliewer, J.4    Skoglund, M.5
  • 22
    • 80054816671 scopus 로고    scopus 로고
    • Rate-equivocation optimal spatially coupled LDPC codes for the BEC wiretap channel
    • St. Petersburg, Russia, Aug
    • V. Rathi, R. Urbanke, M. Andersson, and M. Skoglund, "Rate- equivocation optimal spatially coupled LDPC codes for the BEC wiretap channel," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), St. Petersburg, Russia, Aug. 2011, pp. 2393-2397.
    • (2011) Proc. IEEE Int. Symp. Inform. Theory (ISIT) , pp. 2393-2397
    • Rathi, V.1    Urbanke, R.2    Andersson, M.3    Skoglund, M.4
  • 23
    • 80051774472 scopus 로고    scopus 로고
    • Secret-sharing LDPC codes for the BPSKconstrained Gaussian wiretap channel
    • Sept.
    • C. W. Wong, T. Wong, and J. Shea, "Secret-sharing LDPC codes for the BPSKconstrained Gaussian wiretap channel," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 551-564, Sept. 2011.
    • (2011) IEEE Trans. Inform. Forensics Sec , vol.6 , Issue.3 , pp. 551-564
    • Wong, C.W.1    Wong, T.2    Shea, J.3
  • 24
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inform. Theory, vol. 57, no. 10, pp. 6428-6443, 2011.
    • (2011) IEEE Trans. Inform. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 26
    • 15044364240 scopus 로고    scopus 로고
    • Stopping set distribution of LDPC code ensembles
    • DOI 10.1109/TIT.2004.842571
    • A. Orlitsky, K. Viswanathan, and J. Zhang, "Stopping set distribution of LDPC code ensembles," IEEE Trans. Inform. Theory, vol. 51, no. 3, pp. 929-953, Mar. 2005. (Pubitemid 40377559)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.3 , pp. 929-953
    • Orlitsky, A.1    Viswanathan, K.2    Zhang, J.3
  • 27
    • 80051775152 scopus 로고    scopus 로고
    • Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
    • Sept.
    • A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 585-594, Sept. 2011.
    • (2011) IEEE Trans. Inform. Forensics Sec , vol.6 , Issue.3 , pp. 585-594
    • Subramanian, A.1    Thangaraj, A.2    Bloch, M.3    McLaughlin, S.W.4
  • 28
    • 77955671723 scopus 로고    scopus 로고
    • Construction of wiretap codes from ordinary channel codes
    • Austin, TX, June
    • M. Hayashi and R. Matsumoto, "Construction of wiretap codes from ordinary channel codes," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Austin, TX, June 2010, pp. 2538-2542.
    • (2010) Proc. IEEE Int. Symp. Inform. Theory (ISIT) , pp. 2538-2542
    • Hayashi, M.1    Matsumoto, R.2
  • 29
    • 48649107830 scopus 로고    scopus 로고
    • Syndrome-coding for the wiretap channel revisited
    • Chengdu, China, Oct
    • G. Cohen and G. Zémor, "Syndrome-coding for the wiretap channel revisited," in Proc. IEEE Information Theory Workshop, Chengdu, China, Oct. 2006, pp. 33-36.
    • (2006) Proc. IEEE Information Theory Workshop , pp. 33-36
    • Cohen, G.1    Zémor, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.