TY - GEN
T1 - Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming
AU - Chou, Remi A.
AU - Yener, Aylin
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/8/10
Y1 - 2016/8/10
N2 - We consider strongly secure communication over a discrete memoryless multiple access wiretap channel with two transmitters - no degradation or symmetry assumptions are made on the channel. Our main result is that any rate pair known to be achievable with a random coding like proof, is also achievable with a low-complexity polar coding scheme. Moreover, if the rate pair is known to be achievable without time-sharing, then time-sharing is not needed in our polar coding scheme as well. Our proof technique relies on rate-splitting and different cooperative jamming strategies. Specifically, our coding scheme combines several point-to-point codes that either aim at secretly conveying a message to the legitimate receiver or at performing cooperative jamming. Each point-to-point code relies on a chaining construction to be able to deal with an arbitrary channel and strong secrecy. We assess reliability and strong secrecy through a detailed analysis of the dependencies between the random variables involved in the scheme.
AB - We consider strongly secure communication over a discrete memoryless multiple access wiretap channel with two transmitters - no degradation or symmetry assumptions are made on the channel. Our main result is that any rate pair known to be achievable with a random coding like proof, is also achievable with a low-complexity polar coding scheme. Moreover, if the rate pair is known to be achievable without time-sharing, then time-sharing is not needed in our polar coding scheme as well. Our proof technique relies on rate-splitting and different cooperative jamming strategies. Specifically, our coding scheme combines several point-to-point codes that either aim at secretly conveying a message to the legitimate receiver or at performing cooperative jamming. Each point-to-point code relies on a chaining construction to be able to deal with an arbitrary channel and strong secrecy. We assess reliability and strong secrecy through a detailed analysis of the dependencies between the random variables involved in the scheme.
UR - http://www.scopus.com/inward/record.url?scp=84985920368&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84985920368&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2016.7541446
DO - 10.1109/ISIT.2016.7541446
M3 - Conference contribution
AN - SCOPUS:84985920368
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 983
EP - 987
BT - Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 IEEE International Symposium on Information Theory, ISIT 2016
Y2 - 10 July 2016 through 15 July 2016
ER -