Abstract:
A method and apparatus for providing a secure transmission based on a polar code are provided. A device generates an output bit sequence by applying a polar code generator matrix to an input bit sequence and transmits the output bit sequence to a target receiver. The input bit sequence includes first information bits, second information bits and third information bits. The first information bits correspond to gray bit channels for the target receiver and bad bit channels for an eavesdropper. The third information bits correspond to good bit channels for the target receiver and gray bit channels for the eavesdropper.
Abstract:
There is a provided a method for deciding transmission power to securely transmit data, the method comprising: determining a transmission rate toward an intended receiver, based on an upper limit of a decoding error probability of the intended receiver and a lower limit of a decoding error probability of an unwanted over hearer; and deciding a transmission power toward the intended receiver based on the upper limit and the lower limit. Here, if the upper limit is lower than the lower limit, the transmission toward the intended receiver is not performed.
Abstract:
A method and apparatus for providing a security communication are provided. A device generates an output bit sequence by applying a polar code scheme to an input bit sequence and transmit the output bit sequence to a target receiver. The output bit sequence is generagted based on a double layer polar coding scheme.
Abstract:
The present invention develops a wireless communication transmitting scheme which allows a desired receiver to stably receive data so that data are not tapped by a third party when a transmitter transmits data to the receiver in a wireless scheme. In particular, the third party not a desired receiver taps, a bit error probability of received data is maintained to have about 50%, so that the third party cannot substantially obtain valid data. A suggested scheme of the present invention may transmit security data in a state that a transmitter and a receiver do not have a secret key unlike an existing cryptography.