New Results on Multiple-Input Multiple-Output Broadcast Channels with Confidential Messages [PDF]
This paper presents two new results on multiple-input multiple-output (MIMO) Gaussian broadcast channels with confidential messages. First, the problem of the MIMO Gaussian wiretap channel is revisited.
Liu, Ruoheng +3 more
core +1 more source
Capacity-equivocation region of a special case of wiretap channel with noiseless feedback
The general wiretap channel with noiseless feedback is first investigated by Ahlswede and Cai, where lower and upper bounds on the secrecy capacity are provided in their work. The upper bound is met with equality only in some special cases. In this paper, we study a special case of the general wiretap channel with noiseless feedback (called non ...
Dai, Bin +3 more
openaire +1 more source
On Secure Transmission over Parallel Relay Eavesdropper Channel [PDF]
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent relay-eavesdropper channels as subchannels. For the discrete memoryless case, we establish inner and outer bounds on the rate-equivocation region.
Awan, Zohaib Hassan +2 more
core +3 more sources
Source-Channel Secrecy with Causal Disclosure [PDF]
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul +3 more
core +1 more source
Secure Lossy Source Coding with Side Information at the Decoders [PDF]
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referred to as Bob) and the eavesdropper (referred to as Eve).
Piantanida, Pablo, Villard, Joffrey
core +2 more sources
Improved Rate-Equivocation Regions for Secure Cooperative Communication
A simple four node network in which cooperation improves the information-theoretic secrecy is studied. The channel consists of two senders, a receiver, and an eavesdropper.
Marina, Ninoslav +2 more
core +1 more source
Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel
We consider transmission over a wiretap channel where both the main channel and the wiretapper's channel are Binary Erasure Channels (BEC). We propose a code construction method using two edge type LDPC codes based on the coset encoding scheme.
Andersson, Mattias +4 more
core +1 more source
The MIMO wiretap channel [PDF]
We study the MIMO wiretap channel, a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper.
Hassibi, Babak, Oggier, Frédérique
core +1 more source
On the Construction of Polar Codes for Achieving the Capacity of Marginal Channels
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since polar codes are capacity achieving codes with low encoding-decoding complexity and they can approach perfect secrecy rates ...
Aram, Siamak +3 more
core +1 more source
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe +5 more
core +2 more sources

