Results 11 to 20 of about 6,690 (268)

Compound Wiretap Channels

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
This paper considers the compound wiretap channel, which generalizes Wyner's wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states.
Shlomo Shamai (Shitz)   +3 more
doaj   +3 more sources

The MIMO wiretap channel [PDF]

open access: yes2008 3rd International Symposium on Communications, Control and Signal Processing, 2008
We study the MIMO wiretap channel, a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper.
Hassibi, Babak, Oggier, Frédérique
core   +4 more sources

Secrecy Results for Compound Wiretap Channels [PDF]

open access: yesProblems of Information Transmission, 2012
We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and
AD Wyner   +18 more
core   +2 more sources

Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels [PDF]

open access: yesEntropy
We consider a secure integrated sensing and communication (ISAC) scenario, where a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that
Martin Mittelbach   +4 more
doaj   +2 more sources

Improved polar-code-based efficient post-processing algorithm for quantum key distribution [PDF]

open access: yesScientific Reports, 2022
Combined with one-time pad encryption scheme, quantum key distribution guarantees the unconditional security of communication in theory. However, error correction and privacy amplification in the post-processing phase of quantum key distribution result ...
Junbin Fang   +7 more
doaj   +2 more sources

Enhancing secrecy rates in a wiretap channel

open access: yesDigital Communications and Networks, 2020
Reliable communication imposes an upper limit on the achievable rate, namely the Shannon capacity. Wyner's wiretap coding ensures a security constraint and reliability, but results in a decrease of achievable rate.
Shahid M. Shah, Vinod Sharma
doaj   +3 more sources

Finite-Blocklength Bounds for Wiretap Channels [PDF]

open access: yes2016 IEEE International Symposium on Information Theory (ISIT), 2016
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and converse bounds are derived, which are shown to be tighter than existing bounds.
Poor, H. Vincent   +2 more
core   +2 more sources

The Computational Wiretap Channel [PDF]

open access: yes2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2018
We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h.
D'Oliveira, Rafael G. L.   +2 more
core   +4 more sources

Wiretap Channel with Action-Dependent Channel State Information [PDF]

open access: yesEntropy, 2013
In this paper, we investigate the model of wiretap channel with action-dependent channel state information. Given the message to be communicated, the transmitter chooses an action sequence that affects the formation of the channel states, and then ...
Bin Dai   +3 more
doaj   +3 more sources

Some New Results on the Multiple-AccessWiretap Channel [PDF]

open access: yesEntropy, 2014
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specifically, first, we investigate the degraded MAC-WT, where two users transmit their corresponding confidential messages (no common message) to a legitimate ...
Bin Dai, Zheng Ma
doaj   +4 more sources

Home - About - Disclaimer - Privacy