Results 21 to 30 of about 6,690 (268)

Wiretap Channel With Side Information [PDF]

open access: yesIEEE Transactions on Information Theory, 2006
This correspondence gives an achievable rate equivocation region for the discrete memoryless wiretap channel with side information. We extend our results to the Gaussian case. The main contribution of this correspondence is that, for the Gaussian wiretap channel, the side information helps to get a larger secrecy capacity and a larger rate equivocation
Vinck, A. J. Han, Chen, Yanling
openaire   +3 more sources

E - Capacity - Equivocation Region of Wiretap Channel [PDF]

open access: yesJournal of Universal Computer Science, 2021
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj   +3 more sources

Additivity in Classical-Quantum Wiretap Channels [PDF]

open access: yes2020 IEEE International Symposium on Information Theory (ISIT), 2020
Due to Csiszar and Korner, the capacity of classical wiretap channels has a single-letter characterization in terms of the private information. For quantum wiretap channels, however, it is known that regularization of the private information is necessary to reach the capacity.
Tikku, A, Renes, JM, Berta, M
openaire   +2 more sources

Wiretap channel with causal state information [PDF]

open access: yes2010 IEEE International Symposium on Information Theory, 2010
V2: Minor edits. 19 pages, 3 figures V3: Minor edits.
Chia, Yeow-Khiang, Gamal, Abbas El
openaire   +2 more sources

Semantic Security for Quantum Wiretap Channels [PDF]

open access: yes2020 IEEE International Symposium on Information Theory (ISIT), 2020
We consider the problem of semantic security via classical-quantum and quantum wiretap channels and use explicit constructions to transform a non-secure code into a semantically secure code, achieving capacity by means of biregular irreducible functions. Explicit parameters in finite regimes can be extracted from theorems.
Holger Boche   +4 more
openaire   +3 more sources

Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design

open access: yesIEEE Access, 2023
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang   +3 more
doaj   +1 more source

The degraded Gaussian diamond-wiretap channel [PDF]

open access: yes2015 IEEE International Symposium on Information Theory (ISIT), 2015
26 pages, 6 figures, a short version will appear in Proc.
Lee, Si-Hyeon, Khisti, Ashish
openaire   +4 more sources

Adversarial wiretap channel with public discussion [PDF]

open access: yes2015 IEEE Conference on Communications and Network Security (CNS), 2015
Wyner's elegant model of wiretap channel exploits noise in the communication channel to provide perfect secrecy against a computationally unlimited eavesdropper without requiring a shared key. We consider an adversarial model of wiretap channel proposed in [18,19] where the adversary is active: it selects a fraction $ _r$ of the transmitted codeword ...
Wang, Pengwei, Safavi-Naini, Reihaneh
openaire   +2 more sources

Some New Results on the GaussianWiretap Feedback Channel

open access: yesEntropy, 2019
In this paper, the Gaussian wiretap feedback channel is revisited, and some new resultson its secrecy capacity are obtained. To be specific, first, we show that the Schalkwijk−Kailath (SK)feedback scheme, which achieves the secrecy capacity of the ...
Chenxu Wei, Linman Yu, Bin Dai
doaj   +1 more source

Degraded Compound Multi-Receiver Wiretap Channels [PDF]

open access: yesIEEE Transactions on Information Theory, 2012
Submitted to IEEE Transactions on Information Theory, October ...
Ekrem, Ersen, Ulukus, Sennur
openaire   +2 more sources

Home - About - Disclaimer - Privacy