Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 134 tok/s
Gemini 2.5 Pro 41 tok/s Pro
GPT-5 Medium 28 tok/s Pro
GPT-5 High 22 tok/s Pro
GPT-4o 72 tok/s Pro
Kimi K2 211 tok/s Pro
GPT OSS 120B 438 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

LDPC Codes over Gaussian Multiple Access Wiretap Channel (1801.04420v2)

Published 13 Jan 2018 in cs.IT and math.IT

Abstract: We study the problem of two-user Gaussian multiple access channel (GMAC) in the presence of an external eavesdropper. In this problem, an eavesdropper receives a signal with a lower signal-to-noise ratio (SNR) compared to the legitimate receiver and all transmitted messages should be kept confidential against the eavesdropper. For this purpose, we propose a secure coding scheme on this channel which utilizes low-density parity-check (LDPC) codes by employing random bit insertion and puncturing techniques. At each encoder, the confidential message with some random bits as a random message are systematically encoded, and then the associated bits to the confidential message are punctured. Next, the encoders send their unpunctured bits over a Gaussian multiple access wiretap channel (GMAC-WT). The puncturing distribution applied to the LDPC code is considered in two cases: random and optimized. We utilize a modified extrinsic information transfer (EXIT) chart analysis to optimize the puncturing distribution for each encoder. The security gap is used as a measure of secrecy for the sent messages over GMAC-WT which should be made as small as possible. We compare the achieved secure rate pair with an achievable secrecy rate region of GMAC-WT to show the effective performance of the proposed scheme. In this paper, equal and unequal power conditions at the transmitters are investigated. For both cases, we attain a fairly small security gap which is equivalent to achieve the points near the secrecy rate region of GMAC-WT.

Citations (3)

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.