Results 21 to 30 of about 6,690 (268)
Wiretap Channel With Side Information [PDF]
This correspondence gives an achievable rate equivocation region for the discrete memoryless wiretap channel with side information. We extend our results to the Gaussian case. The main contribution of this correspondence is that, for the Gaussian wiretap channel, the side information helps to get a larger secrecy capacity and a larger rate equivocation
Vinck, A. J. Han, Chen, Yanling
openaire +3 more sources
E - Capacity - Equivocation Region of Wiretap Channel [PDF]
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj +3 more sources
Additivity in Classical-Quantum Wiretap Channels [PDF]
Due to Csiszar and Korner, the capacity of classical wiretap channels has a single-letter characterization in terms of the private information. For quantum wiretap channels, however, it is known that regularization of the private information is necessary to reach the capacity.
Tikku, A, Renes, JM, Berta, M
openaire +2 more sources
Wiretap channel with causal state information [PDF]
V2: Minor edits. 19 pages, 3 figures V3: Minor edits.
Chia, Yeow-Khiang, Gamal, Abbas El
openaire +2 more sources
Semantic Security for Quantum Wiretap Channels [PDF]
We consider the problem of semantic security via classical-quantum and quantum wiretap channels and use explicit constructions to transform a non-secure code into a semantically secure code, achieving capacity by means of biregular irreducible functions. Explicit parameters in finite regimes can be extracted from theorems.
Holger Boche +4 more
openaire +3 more sources
Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang +3 more
doaj +1 more source
The degraded Gaussian diamond-wiretap channel [PDF]
26 pages, 6 figures, a short version will appear in Proc.
Lee, Si-Hyeon, Khisti, Ashish
openaire +4 more sources
Adversarial wiretap channel with public discussion [PDF]
Wyner's elegant model of wiretap channel exploits noise in the communication channel to provide perfect secrecy against a computationally unlimited eavesdropper without requiring a shared key. We consider an adversarial model of wiretap channel proposed in [18,19] where the adversary is active: it selects a fraction $ _r$ of the transmitted codeword ...
Wang, Pengwei, Safavi-Naini, Reihaneh
openaire +2 more sources
Some New Results on the GaussianWiretap Feedback Channel
In this paper, the Gaussian wiretap feedback channel is revisited, and some new resultson its secrecy capacity are obtained. To be specific, first, we show that the Schalkwijk−Kailath (SK)feedback scheme, which achieves the secrecy capacity of the ...
Chenxu Wei, Linman Yu, Bin Dai
doaj +1 more source
Degraded Compound Multi-Receiver Wiretap Channels [PDF]
Submitted to IEEE Transactions on Information Theory, October ...
Ekrem, Ersen, Ulukus, Sennur
openaire +2 more sources

