We consider transmission over a wiretap channel where both the main channeland the wiretapper's channel are Binary Erasure Channels (BEC). We propose acode construction method using two edge type LDPC codes based on the cosetencoding scheme. Using a standard LDPC ensemble with a given threshold over theBEC, we give a construction for a two edge type LDPC ensemble with the samethreshold. If the given standard LDPC ensemble has degree two variable nodes,our construction gives rise to degree one variable nodes in the code used overthe main channel. This results in zero threshold over the main channel. Inorder to circumvent this problem, we numerically optimize the degreedistribution of the two edge type LDPC ensemble. We find that the resultingensembles are able to perform close to the boundary of the rate-equivocationregion of the wiretap channel. There are two performance criteria for a coding scheme used over a wiretapchannel: reliability and secrecy. The reliability measure corresponds to theprobability of decoding error for the intended receiver. This can be easilymeasured using density evolution recursion. However, it is more challenging tocharacterize secrecy, corresponding to the equivocation of the message for thewiretapper. M\'easson, Montanari, and Urbanke have shown how the equivocationcan be measured for a broad range of standard LDPC ensembles for transmissionover the BEC under the point-to-point setup. By generalizing the method ofM\'easson, Montanari, and Urbanke to two edge type LDPC ensembles, we show howthe equivocation for the wiretapper can be computed. We find that relativelysimple constructions give very good secrecy performance and are close to thesecrecy capacity. However finding explicit sequences of two edge type LDPCensembles which achieve secrecy capacity is a more difficult problem. We poseit as an interesting open problem.
展开▼
机译:我们考虑通过窃听信道进行传输,其中主信道和窃听者的信道都是二进制擦除信道(BEC)。我们提出了一种基于cosetencoding方案的使用两个边缘类型LDPC码的代码构造方法。使用在BEC上具有给定阈值的标准LDPC集成,我们给出了具有相同阈值的两边缘型LDPC集成的构造。如果给定的标准LDPC集合具有二阶可变节点,则我们的构造将在主通道上使用的代码中生成一阶可变节点。这导致主通道上的零阈值。为了解决这个问题,我们在数值上优化了两个边缘型LDPC集合的度分布。我们发现,所得合奏能够在窃听通道的速率等同区域的边界附近执行。对于在窃听通道上使用的编码方案,有两个性能标准:可靠性和保密性。可靠性度量对应于预期接收器的解码错误的概率。这可以使用密度演化递归轻松地测量。但是,表征保密性相对于窃听者消息的模棱两可更具挑战性。 M \'easson,Montanari和Urbanke展示了如何在点对点设置下通过BEC传输的各种标准LDPC集成中,测量模棱两可。通过将M'easson,Montanari和Urbanke的方法推广到两个边缘型LDPC集成,我们展示了如何计算窃听者的等值线。我们发现相对简单的结构提供了很好的保密性能,并且接近于保密能力。然而,找到两个具有保密能力的边缘型LDPC集合的显式序列是一个更困难的问题。我们认为这是一个有趣的开放问题。
展开▼