Results 31 to 40 of about 6,771 (265)

Adversarial wiretap channel with public discussion [PDF]

open access: yes2015 IEEE Conference on Communications and Network Security (CNS), 2015
Wyner's elegant model of wiretap channel exploits noise in the communication channel to provide perfect secrecy against a computationally unlimited eavesdropper without requiring a shared key. We consider an adversarial model of wiretap channel proposed in [18,19] where the adversary is active: it selects a fraction $ρ_r$ of the transmitted codeword to
Pengwei Wang 0006, Reihaneh Safavi-Naini
openaire   +2 more sources

Semantic Security for the Wiretap Channel [PDF]

open access: yes, 2012
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than the channel from sender to receiver. It has developed in the Information and Coding IC it has optimal rate; and both the encryption and decryption ...
Mihir Bellare   +2 more
openaire   +1 more source

Randomized Turbo Codes for the Wiretap Channel [PDF]

open access: yesGLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017
We study application of parallel and serially concatenated convolutional codes known as turbo codes to the randomized encoding scheme introduced by Wyner for physical layer security. For this purpose, we first study how randomized convolutional codes can be constructed. Then, we use them as building blocks for developing randomized turbo codes. We also
Nooraiepour, Alireza, Duman, Tolga M.
openaire   +3 more sources

The degraded Gaussian diamond-wiretap channel [PDF]

open access: yes2015 IEEE International Symposium on Information Theory (ISIT), 2015
26 pages, 6 figures, a short version will appear in Proc.
Si-Hyeon Lee, Ashish Khisti
openaire   +2 more sources

Wiretap channel with causal state information [PDF]

open access: yes2010 IEEE International Symposium on Information Theory, 2010
V2: Minor edits. 19 pages, 3 figures V3: Minor edits.
Yeow-Khiang Chia, Abbas El Gamal
openaire   +2 more sources

Secret Sharing over Fast-Fading MIMO Wiretap Channels

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different ...
Bloch Matthieu, Wong TanF, Shea JohnM
doaj   +2 more sources

Cooperation Diversity for Secrecy Enhancement in Cognitive Relay Wiretap Network Over Correlated Fading Channels

open access: yesIEEE Access, 2018
In this paper, we investigate the secrecy performance of dual-hop randomize-and-forward (RaF) cognitive relay multi-channel wiretap networks over correlated fading channels, in which the eavesdropper can wiretap the information from source and relays ...
Mu Li   +4 more
doaj   +1 more source

The Wiretap Channel With Feedback: Encryption Over the Channel [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
Submitted to IEEE Transactions on Information ...
Lifeng Lai   +2 more
openaire   +2 more sources

The Secrecy Capacity of the MIMO Wiretap Channel [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that ...
Oggier, Frédérique, Hassibi, Babak
openaire   +5 more sources

Semantic Security for Quantum Wiretap Channels [PDF]

open access: yes2020 IEEE International Symposium on Information Theory (ISIT), 2020
We consider the problem of semantic security via classical-quantum and quantum wiretap channels and use explicit constructions to transform a non-secure code into a semantically secure code, achieving capacity by means of biregular irreducible functions. Explicit parameters in finite regimes can be extracted from theorems.
Holger Boche   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy