Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電信工程學研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/82346
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor蘇炫榮(Hsuan-Jung Su)
dc.contributor.authorYen-Pin Huangen
dc.contributor.author黃彥斌zh_TW
dc.date.accessioned2022-11-25T07:29:30Z-
dc.date.available2025-07-24
dc.date.copyright2021-11-09
dc.date.issued2021
dc.date.submitted2021-07-27
dc.identifier.citationBibliography [1] Y. Liang, L. Lai, H. V. Poor, and S. Shamai, “A broadcast approach for fading wiretap channels,” IEEE Transactions on Information Theory, vol. 60, no. 2, pp.842858, 2013. [2] M. Bloch, M. Hayashi, and A. Thangaraj, “Error-control coding for physical-layer secrecy,” Proceedings of the IEEE, vol. 103, no. 10, pp.1725–1746, 2015. [3] J. Honda and H. Yamamoto, “Polar coding without alphabet extension for asymmetric models,” IEEE Transactions on Information Theory,vol. 59, no. 12, pp. 7829-7838,2013. [4] A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, Oct 1975. [5] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp.339–348, May 1978. [6] U. M. Maurer, “The strong secret key rate of discrete random triples,”in Communications and Cryptography. Springer, 1994, pp. 271–285. [7] I. Csisz’ar, “Almost independence and secrecy capacity,” Problemy Peredachi Informatsii, vol. 32, no. 1, pp. 48–57, 1996. [8] E. Arikan, “Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels,” IEEE Transactions on information Theory, vol. 55, no. 7, pp. 3051–3073, 2009. [9] H. Mahdavifar and A. Vardy, “Achieving the secrecy capacity of wiretap channels using polar codes,” IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 6428–6443, 2011. [10] A. Hyadi, Z. Rezki, and M.-S. Alouini, “An overview of physical layer security in wireless communication systems with csit uncertainty,” IEEE Access, vol. 4, pp. 6121–6132, 2016. [11] W. Hao, L. Yin, and Q. Huang, “Secrecy transmission scheme based on 2-d polar coding over block fading wiretap channels,” IEEE Communications Letters, vol. 22, no. 5, pp. 882-885,2018. [12] H. Si, O. O. Koyluoglu, and S. Vishwanath, “Hierarchical polar coding for achieving secrecy over state-dependent wiretap channels without any instantaneous csi,”IEEE Transactions on Communications, vol. 64, no. 9, pp. 3609–3623, 2016. [13] X. He and A. Yener, “Mimo wiretap channels with unknown and varying eavesdropper channel states,” IEEE Transactions on Information Theory, vol. 60, no. 11, pp. 6844–6869, 2014. [14] L. Luzzi, R. Vehkalahti, and C. Ling, “Almost universal codes for mimo wiretap channels,” IEEE Transactions on Information Theory, vol. 64, no. 11, pp. 7218–7241, 2018. [15] M. Zheng, M. Tao, W. Chen, and C. Ling, “Secure polar coding for the two-way wiretap channel,” IEEE Access, vol. 6, pp. 21 731–21 744, 2018. [16] Y.-P. Wei and S. Ulukus, “Polar coding for the general wiretap channel with extensions to multiuser scenarios,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 2, pp. 278–291, 2015. [17] S. Zou, Y. Liang, L. Lai, H. V. Poor, and S. S. Shitz, “Degraded broadcast channel with secrecy outside a bounded range,” IEEE Transactions on Information Theory, vol. 64, no. 3, pp. 2104–2120, 2018. [18] S. Zou, Y. Liang, L. Lai, and S. Shamai, “Degraded broadcast channel:Secrecy outside of a bounded range,” in 2015 IEEE Information Theory Workshop (ITW), 2015, pp. 1–5. [19] S. Zou, Y. Liang, L. Lai, and S. Shamai, “Rate splitting and sharing for degraded broadcast channel with secrecy outside a bounded range,”in 2015 IEEE International Symposium on Information Theory (ISIT).IEEE, 2015, pp. 1357–1361. [20] A. Ingber and M. Feder, “On the optimality of multilevel coding and multistage decoding,” in 2008 IEEE 25th Convention of Electrical and Electronics Engineers in Israel. IEEE, 2008, pp. 731–735. [21] A. Abotabl and A. Nosratinia, “Achieving the secrecy capacity of the awgn wiretap channel via multilevel coding,” in 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2017, pp. 894–901. [22] T. Liu and S. Shamai, “A note on the secrecy capacity of the multiple antenna wiretap channel,” IEEE Transactions on Information Theory, vol. 55, no. 6, pp. 2547–2553, 2009. [23] C. H. Bennett, G. Brassard, C. Cr’epeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Transactions on Information Theory, vol. 41, no. 6, pp. 1915–1923, 1995. [24] R. A. Chou and M. R. Bloch, “Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes,” in 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2015, pp. 1380–1385. [25] D. A. Levin and Y. Peres, Markov chains and mixing times. American Mathematical Soc., 2017, vol. 107. [26] I. Csiszar and J. K‥orner, Information theory: coding theorems for discrete memoryless systems. Cambridge University Press, 2011. [27] H. Vangala, E. Viterbo, and Y. Hong, “A comparative study of polar code constructions for the awgn channel,” arXiv preprint arXiv:1501.02473, 2015. [28] H. Mahdavifar, “Polar coding for non-stationary channels,” IEEE Transactions on Information Theory, vol. 66, no. 11, pp. 6920–6938,2020. [29] M. Alsan and E. Telatar, “A simple proof of polarization and polarization for non-stationary memoryless channels,” IEEE Transactions on Information Theory, vol. 62, no. 9, pp. 4873–4878, 2016. [30] E. Arikan, “Source polarization,” in 2010 IEEE International Symposium on Information Theory, 2010, pp.899–903. [31] N. Goela, E. Abbe, and M. Gastpar, “Polar codes for broadcast channels,” IEEE Transactions on Information Theory, vol. 61, no. 2, pp.758–782, 2015. [32] S. Zou, Y. Liang, L. Lai, H. V. Poor, and S. Shamai, “Broadcast networks with layered decoding and layered secrecy: Theory and applications,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1841–1856, 2015. [33] E. S﹐a﹐soglu and A. Vardy, “A new polar coding scheme for strong security on wiretap channels,” in 2013 IEEE International Symposium on Information Theory. IEEE, 2013, pp. 1117–1121. [34] R. A. Chou and M. R. Bloch, “Polar coding for the broadcast channel with confidential messages: A random binning analogy,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2410–2429, 2016. [35] T. C. Gulcu and A. Barg, “Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component,” IEEE Transactions on Information Theory, vol. 63, no. 2, pp. 1311–1324, 2016. [36] J. del Olmo and J. R. Fonollosa, “Strong secrecy on a class of degraded broadcast channels using polar codes,” in 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016, pp. 601–605. [37] A. El Gamal and Y.-H. Kim, Network information theory. Cambridge university press, 2011.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/82346-
dc.description.abstract我們考慮一個區塊衰落竊聽通道模型,其中傳輸者只有主通道和竊聽通道狀態訊息的分佈,合法接收者和竊聽者有自己完美的通道狀態訊息。對於區塊衰落,通道狀態在區塊之中是不變的。本論文的目的是使秘密傳輸速率能適應主通道和竊聽通道的變化。論文中,我們只關注有限離散的主通道和竊聽通道狀態訊息,並使用廣播方法進行傳輸。由於極化碼的多功能性,我們利用極化碼來實現這一目標,由於實際極化碼的長度有限,因此在啟動傳輸方面需要一個幾乎能忽略速率的額外傳輸。zh_TW
dc.description.provenanceMade available in DSpace on 2022-11-25T07:29:30Z (GMT). No. of bitstreams: 1
U0001-2107202114210100.pdf: 1242361 bytes, checksum: 0b8deb9e6d00b308de446efe801c08da (MD5)
Previous issue date: 2021
en
dc.description.tableofcontentsContents 1 Introduction 1 1.1 Background............................1 1.2 Contributions...........................6 1.3 OverviewofThesis........................6 1.4 Notations.............................8 2 Review of Basic Wiretap Channel Model 9 2.1 Basic Wiretap Channel Model..................9 3 Motivation 20 3.1 Motivation and the state-of-art Development of Fading Wiretap Channel Model........................20 4 System Model 23 4.1 System Model and Objective...................23 5 Polar Coding Secure Transmission 27 5.1 Review of Generic Coding Approaches For Secrecy.......27 5.2 Review of Polar Code.......................34 5.3 Polar Coding Secure Transmission................38 5.3.1 Polar Code for Wiretap Channel............38 5.3.2 Polar Code Encoding...................41 5.3.3 Polar Code Decoding...................43 5.3.4 Performance of the Polar Coding Scheme........43 6 Simulation Results 52 6.1 Monte-Carlo Method.......................53 6.2 Partition of Indices........................54 6.3 Performance Evaluation.....................55 7 Conclusion 64 8 FutureWorks 66 A Proof of Generalized Bhattacharyya Parameter 68 B Proof of Lemma2 74 Bibliography 78
dc.language.isoen
dc.subject區塊衰落通道zh_TW
dc.subject降質廣播通道zh_TW
dc.subject極化碼zh_TW
dc.subject鏈結構zh_TW
dc.subject強保密zh_TW
dc.subjectchain constructionen
dc.subjectpolar codeen
dc.subjectblock fading channelen
dc.subjectdegraded broadcast channelen
dc.subjectstrong secrecyen
dc.title極化碼於區塊衰落竊聽通道設計zh_TW
dc.titleDesign of Polar Codes for Block Fading Wiretap Channelen
dc.date.schoolyear109-2
dc.description.degree碩士
dc.contributor.oralexamcommittee林士駿(Hsin-Tsai Liu),王奕翔(Chih-Yang Tseng)
dc.subject.keyword極化碼,區塊衰落通道,降質廣播通道,強保密,鏈結構,zh_TW
dc.subject.keywordpolar code,block fading channel,degraded broadcast channel,strong secrecy,chain construction,en
dc.relation.page83
dc.identifier.doi10.6342/NTU202101627
dc.rights.note同意授權(全球公開)
dc.date.accepted2021-07-28
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電信工程學研究所zh_TW
dc.date.embargo-lift2025-07-24-
顯示於系所單位:電信工程學研究所

文件中的檔案:
檔案 大小格式 
U0001-2107202114210100.pdf1.21 MBAdobe PDF檢視/開啟
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved