Abstract:
In this paper we show a way to check semantic security for AWGN wiretap channels. We introduce low complexity decoding methods that provide upper and lower bounds to the ...Show MoreMetadata
Abstract:
In this paper we show a way to check semantic security for AWGN wiretap channels. We introduce low complexity decoding methods that provide upper and lower bounds to the performance of an attack strategy that closely resembles the best attack strategy, which has the problem of large computational complexity. We show the assumptions under which these methods can be applied and compare simulation results of the bounds to the performance of the best attack strategy. We use a seeded modular coding scheme, which consists of a coding layer and a security layer. For the coding layer we use polar codes, but the method is neither restricted to the seeded modular coding scheme nor to the polar codes.
Date of Conference: 26-29 March 2023
Date Added to IEEE Xplore: 12 May 2023
ISBN Information:
ISSN Information:
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- AWGN channels ,
- Simulation ,
- Semantics ,
- Encoding ,
- Hardware ,
- Decoding ,
- Security
- Index Terms
- Lower Bound ,
- Wiretap Channel ,
- Performance Of Strategies ,
- Attack Strategy ,
- Decoding Method ,
- Polar Codes ,
- Rest Of The Paper ,
- Output Layer ,
- Channel Model ,
- Output Channels ,
- Generator Matrix ,
- Forward Error Correction ,
- Error Patterns ,
- List Size ,
- Linear Code ,
- Parity-check ,
- Random Bits ,
- Information-theoretic Security
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- AWGN channels ,
- Simulation ,
- Semantics ,
- Encoding ,
- Hardware ,
- Decoding ,
- Security
- Index Terms
- Lower Bound ,
- Wiretap Channel ,
- Performance Of Strategies ,
- Attack Strategy ,
- Decoding Method ,
- Polar Codes ,
- Rest Of The Paper ,
- Output Layer ,
- Channel Model ,
- Output Channels ,
- Generator Matrix ,
- Forward Error Correction ,
- Error Patterns ,
- List Size ,
- Linear Code ,
- Parity-check ,
- Random Bits ,
- Information-theoretic Security