
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
handle: 2117/335398
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eavesdropper. We consider a model in which the transmitter wishes to send different confidential (and non-confidential) information to each legitimate receiver. First, we compare two inner-bounds on the achievable region of this model from the literature, and then we design a polar coding scheme that achieves the stronger one. In the proposed scheme, the encoding uses polar-based Marton's coding, where one inner-layer must be reliably decoded by both legitimate receivers, and each receiver must decode its own corresponding outer-layer. Due to the non-degradedness condition of the broadcast channel, the encoder builds a chaining construction that induces bidirectional dependencies between adjacent blocks. Indeed, these dependencies can occur between different encoding layers of different blocks. The use of two secret-keys, whose length are negligible in terms of rate, are required to prove that the polar code satisfies the strong secrecy condition.
FOS: Computer and information sciences, Polar codes, Decoding, Computer Science - Information Theory, Information Theory (cs.IT), Broadcast channels, Telecommunication -- Security measures, Channel coding, Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica, Telecommunication security, :Informàtica::Seguretat informàtica [Àrees temàtiques de la UPC], Telecomunicació -- Mesures de seguretat
FOS: Computer and information sciences, Polar codes, Decoding, Computer Science - Information Theory, Information Theory (cs.IT), Broadcast channels, Telecommunication -- Security measures, Channel coding, Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica, Telecommunication security, :Informàtica::Seguretat informàtica [Àrees temàtiques de la UPC], Telecomunicació -- Mesures de seguretat
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
views | 21 | |
downloads | 57 |