{"title":"Transforming an arbitrary code for the wiretap channel of type I into a code for the wiretap channel of type II","authors":"Eric Graves, Allison Beemer","doi":"10.1109/ITW44776.2019.8989048","DOIUrl":null,"url":null,"abstract":"We construct a modular scheme which extends codes for wiretap channels of type I for use in wiretap channels of type II. This is done by using a concatenate and permute strategy, wherein multiple uses of the wiretap type I code are concatenated and then the joint sequence of symbols permuted. The choice of permutation is then encoded with a short code and appended to the transmitted sequence. Analysis shows essentially no degradation in operational parameters (rate, error rate, leakage) for the new code over the wiretap type II channel when compared to those of multiple uses of the original code over the wiretap type I channel.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Information Theory Workshop (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW44776.2019.8989048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We construct a modular scheme which extends codes for wiretap channels of type I for use in wiretap channels of type II. This is done by using a concatenate and permute strategy, wherein multiple uses of the wiretap type I code are concatenated and then the joint sequence of symbols permuted. The choice of permutation is then encoded with a short code and appended to the transmitted sequence. Analysis shows essentially no degradation in operational parameters (rate, error rate, leakage) for the new code over the wiretap type II channel when compared to those of multiple uses of the original code over the wiretap type I channel.