Skip to main content

Linear-time decodable secrecy codes for binary erasure wiretap channels

Publication ,  Conference
Souvik, D; Thangaraj, A; McLaughlin, SW; Calderbank, AR
Published in: 43rd Annual Allerton Conference on Communication, Control and Computing 2005
January 1, 2005

In this paper we consider encoder and decoder design for codes achieving perfect secrecy on the wiretap channel. We consider the special case of a noiseless main channel and binary erasure channel (BEC) as the wiretapper's channel and show that it is possible to construct linear-time decodable secrecy codes based on LDPC codes that achieve perfect secrecy.

Duke Scholars

Published In

43rd Annual Allerton Conference on Communication, Control and Computing 2005

Publication Date

January 1, 2005

Volume

3

Start / End Page

1548 / 1556
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Souvik, D., Thangaraj, A., McLaughlin, S. W., & Calderbank, A. R. (2005). Linear-time decodable secrecy codes for binary erasure wiretap channels. In 43rd Annual Allerton Conference on Communication, Control and Computing 2005 (Vol. 3, pp. 1548–1556).
Souvik, D., A. Thangaraj, S. W. McLaughlin, and A. R. Calderbank. “Linear-time decodable secrecy codes for binary erasure wiretap channels.” In 43rd Annual Allerton Conference on Communication, Control and Computing 2005, 3:1548–56, 2005.
Souvik D, Thangaraj A, McLaughlin SW, Calderbank AR. Linear-time decodable secrecy codes for binary erasure wiretap channels. In: 43rd Annual Allerton Conference on Communication, Control and Computing 2005. 2005. p. 1548–56.
Souvik, D., et al. “Linear-time decodable secrecy codes for binary erasure wiretap channels.” 43rd Annual Allerton Conference on Communication, Control and Computing 2005, vol. 3, 2005, pp. 1548–56.
Souvik D, Thangaraj A, McLaughlin SW, Calderbank AR. Linear-time decodable secrecy codes for binary erasure wiretap channels. 43rd Annual Allerton Conference on Communication, Control and Computing 2005. 2005. p. 1548–1556.

Published In

43rd Annual Allerton Conference on Communication, Control and Computing 2005

Publication Date

January 1, 2005

Volume

3

Start / End Page

1548 / 1556