Results 31 to 40 of about 6,771 (265)
Adversarial wiretap channel with public discussion [PDF]
Wyner's elegant model of wiretap channel exploits noise in the communication channel to provide perfect secrecy against a computationally unlimited eavesdropper without requiring a shared key. We consider an adversarial model of wiretap channel proposed in [18,19] where the adversary is active: it selects a fraction $ρ_r$ of the transmitted codeword to
Pengwei Wang 0006, Reihaneh Safavi-Naini
openaire +2 more sources
Semantic Security for the Wiretap Channel [PDF]
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than the channel from sender to receiver. It has developed in the Information and Coding IC it has optimal rate; and both the encryption and decryption ...
Mihir Bellare +2 more
openaire +1 more source
Randomized Turbo Codes for the Wiretap Channel [PDF]
We study application of parallel and serially concatenated convolutional codes known as turbo codes to the randomized encoding scheme introduced by Wyner for physical layer security. For this purpose, we first study how randomized convolutional codes can be constructed. Then, we use them as building blocks for developing randomized turbo codes. We also
Nooraiepour, Alireza, Duman, Tolga M.
openaire +3 more sources
The degraded Gaussian diamond-wiretap channel [PDF]
26 pages, 6 figures, a short version will appear in Proc.
Si-Hyeon Lee, Ashish Khisti
openaire +2 more sources
Wiretap channel with causal state information [PDF]
V2: Minor edits. 19 pages, 3 figures V3: Minor edits.
Yeow-Khiang Chia, Abbas El Gamal
openaire +2 more sources
Secret Sharing over Fast-Fading MIMO Wiretap Channels
Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different ...
Bloch Matthieu, Wong TanF, Shea JohnM
doaj +2 more sources
In this paper, we investigate the secrecy performance of dual-hop randomize-and-forward (RaF) cognitive relay multi-channel wiretap networks over correlated fading channels, in which the eavesdropper can wiretap the information from source and relays ...
Mu Li +4 more
doaj +1 more source
The Wiretap Channel With Feedback: Encryption Over the Channel [PDF]
Submitted to IEEE Transactions on Information ...
Lifeng Lai +2 more
openaire +2 more sources
The Secrecy Capacity of the MIMO Wiretap Channel [PDF]
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that ...
Oggier, Frédérique, Hassibi, Babak
openaire +5 more sources
Semantic Security for Quantum Wiretap Channels [PDF]
We consider the problem of semantic security via classical-quantum and quantum wiretap channels and use explicit constructions to transform a non-secure code into a semantically secure code, achieving capacity by means of biregular irreducible functions. Explicit parameters in finite regimes can be extracted from theorems.
Holger Boche +4 more
openaire +3 more sources

