liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering. KN Toosi Univ Technol, Iran.ORCID iD: 0000-0001-8883-6926
Brigham Young Univ, UT 84602 USA.
KN Toosi Univ Technol, Iran.
Brigham Young Univ, UT 84602 USA.
2025 (English)In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 20, p. 2450-2463Article in journal (Refereed) Published
Abstract [en]

In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation when coding over a wiretap channel model where the main channel is noiseless and the eavesdropper's channel is a binary symmetric channel (BSC). Using this technique, we present a numerically-derived upper bound for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional infinite blocklength bounds. We also propose a secrecy coding technique that outperforms random binning codes. When there is one overhead bit, this coding technique is optimum and achieves the newly derived bound. For cases with additional bits of overhead, our coding scheme can achieve equivocation rates close to the new bound. Furthermore, we explore the patterns of the generator matrix and the parity-check matrix for linear codes and we present binning techniques for both linear and nonlinear codes using two different approaches: recursive and non-recursive. To our knowledge, this is the first optimization solution for secrecy coding obtained through linear programming. Our new bounds and codes mark a significant breakthrough towards understanding fundamental limits of performance (and how to achieve them in some instances) for the binary symmetric wiretap channel with real finite blocklength coding constructions. Our techniques are especially useful for codes of small to medium blocklength, such as those that may be required by applications with small payloads, such as the Internet of Things.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC , 2025. Vol. 20, p. 2450-2463
Keywords [en]
Secrecy coding; binary symmetric channel; wiretap channel; equivocation rate; finite blocklength codes; linear programming; Secrecy coding; binary symmetric channel; wiretap channel; equivocation rate; finite blocklength codes; linear programming
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:liu:diva-212588DOI: 10.1109/TIFS.2025.3545301ISI: 001439401500007Scopus ID: 2-s2.0-86000726277OAI: oai:DiVA.org:liu-212588DiVA, id: diva2:1947681
Note

Funding Agencies|U.S. NSF [1910812]

Available from: 2025-03-26 Created: 2025-03-26 Last updated: 2025-03-26

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Nikkhah, Ali
By organisation
Database and information techniquesFaculty of Science & Engineering
In the same journal
IEEE Transactions on Information Forensics and Security
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 41 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf