Results 51 to 60 of about 6,690 (268)

Physical-Layer Security of a Binary Data Sequence Transmitted With Bessel–Gaussian Beams Over an Optical Wiretap Channel

open access: yesIEEE Photonics Journal, 2018
When an eavesdropper performs an optical beam-splitting attack in a free-space optical communications channel, it is referred to as an optical wiretap channel, which is an extension of Wyner's wiretap channel model.
Tyan-Lin Wang, Ivan B. Djordjevic
doaj   +1 more source

Wiretap and Gelfand-Pinsker Channels Analogy and its Applications

open access: yes, 2018
An analogy framework between wiretap channels (WTCs) and state-dependent point-to-point channels with non-causal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed.
Goldfeld, Ziv, Permuter, Haim. H.
core   +1 more source

Wiretapped Commitment Over Binary Channels

open access: yes2024 IEEE International Symposium on Information Theory (ISIT)
We propose the problem of wiretapped commitment, where two parties, say committer Alice and receiver Bob, engage in a commitment protocol using a noisy channel as a resource, in the presence of an eavesdropper, say Eve. Noisy versions of Alice's transmission over the wiretap channel are received at both Bob and Eve.
Yadav, Anuj Kumar   +2 more
openaire   +2 more sources

Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region

open access: yesInternational Journal of Information and Communication Technology Research, 2020
In this paper, we aim to study a -user quantum multiple access wiretap channel with an arbitrary number of wiretappers under one-shot setting. In this regard, we first introduce the general quantum multiple access wiretap channel and the simplified ...
Hadi Aghaee, Bahareh Akhbari
doaj  

An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement

open access: yesEntropy, 2017
The classical secret-key agreement (SKA) scheme includes three phases: (a) advantage distillation (AD), (b) reconciliation, and (c) privacy amplification.
Yan Feng   +4 more
doaj   +1 more source

Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing

open access: yes, 2014
We establish an upper bound on the rate of codes for a wiretap channel with public feedback for a fixed probability of error and secrecy parameter. As a corollary, we obtain a strong converse for the capacity of a degraded wiretap channel with public ...
Hayashi, Masahito   +2 more
core   +1 more source

Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]

open access: yes, 2016
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel   +3 more
core   +2 more sources

Non-Additivity in Classical-Quantum Wiretap Channels [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2020
Due to Csiszar and Koerner, the private capacity of classical wiretap channels has a single-letter characterization in terms of the private information. For quantum wiretap channels, however, it is known that regularization of the private information is necessary to reach the capacity.
Arkin Tikku   +2 more
openaire   +4 more sources

Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input

open access: yes, 2014
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the ...
Chockalingam, A., Vishwakarma, Sanjay
core   +1 more source

Source-Channel Secrecy with Causal Disclosure [PDF]

open access: yes, 2012
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy