{"title":"二值输入码间干扰窃听信道的匹配信息率码","authors":"A. Nouri, R. Asvadi","doi":"10.1109/ISIT50566.2022.9834578","DOIUrl":null,"url":null,"abstract":"A two-stage coding scheme is proposed for reliable and secure transmission over intersymbol interference wiretap channels (ISI-WTCs). It is shown that the ultimate bound on the secure rate of linear block codes over ISI-WTCs is achieved by an independent and uniformly distributed (i.u.d.) input process. Aiming to exceed the i.u.d. secure rate, the proposed scheme comprises the concatenation of an inner trellis code and an outer coset code. The inner stage emulates a Markov process for achieving the constrained secrecy capacity of the ISI-WTC. In contrast, the outer stage vanishes an obtained upper bound on the rate of information leakage toward satisfying the so-called weak secrecy criterion. A carefully modified density evolution confirms the secrecy and the reliability efficiency of the proposed coding scheme at secure rates close to the constrained secrecy capacity.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Matched Information Rate Codes for Binary-Input Intersymbol Interference Wiretap Channels\",\"authors\":\"A. Nouri, R. Asvadi\",\"doi\":\"10.1109/ISIT50566.2022.9834578\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A two-stage coding scheme is proposed for reliable and secure transmission over intersymbol interference wiretap channels (ISI-WTCs). It is shown that the ultimate bound on the secure rate of linear block codes over ISI-WTCs is achieved by an independent and uniformly distributed (i.u.d.) input process. Aiming to exceed the i.u.d. secure rate, the proposed scheme comprises the concatenation of an inner trellis code and an outer coset code. The inner stage emulates a Markov process for achieving the constrained secrecy capacity of the ISI-WTC. In contrast, the outer stage vanishes an obtained upper bound on the rate of information leakage toward satisfying the so-called weak secrecy criterion. A carefully modified density evolution confirms the secrecy and the reliability efficiency of the proposed coding scheme at secure rates close to the constrained secrecy capacity.\",\"PeriodicalId\":348168,\"journal\":{\"name\":\"2022 IEEE International Symposium on Information Theory (ISIT)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Symposium on Information Theory (ISIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT50566.2022.9834578\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT50566.2022.9834578","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Matched Information Rate Codes for Binary-Input Intersymbol Interference Wiretap Channels
A two-stage coding scheme is proposed for reliable and secure transmission over intersymbol interference wiretap channels (ISI-WTCs). It is shown that the ultimate bound on the secure rate of linear block codes over ISI-WTCs is achieved by an independent and uniformly distributed (i.u.d.) input process. Aiming to exceed the i.u.d. secure rate, the proposed scheme comprises the concatenation of an inner trellis code and an outer coset code. The inner stage emulates a Markov process for achieving the constrained secrecy capacity of the ISI-WTC. In contrast, the outer stage vanishes an obtained upper bound on the rate of information leakage toward satisfying the so-called weak secrecy criterion. A carefully modified density evolution confirms the secrecy and the reliability efficiency of the proposed coding scheme at secure rates close to the constrained secrecy capacity.