Results 51 to 60 of about 6,690 (268)
When an eavesdropper performs an optical beam-splitting attack in a free-space optical communications channel, it is referred to as an optical wiretap channel, which is an extension of Wyner's wiretap channel model.
Tyan-Lin Wang, Ivan B. Djordjevic
doaj +1 more source
Wiretap and Gelfand-Pinsker Channels Analogy and its Applications
An analogy framework between wiretap channels (WTCs) and state-dependent point-to-point channels with non-causal encoder channel state information (referred to as Gelfand-Pinker channels (GPCs)) is proposed.
Goldfeld, Ziv, Permuter, Haim. H.
core +1 more source
Wiretapped Commitment Over Binary Channels
We propose the problem of wiretapped commitment, where two parties, say committer Alice and receiver Bob, engage in a commitment protocol using a noisy channel as a resource, in the presence of an eavesdropper, say Eve. Noisy versions of Alice's transmission over the wiretap channel are received at both Bob and Eve.
Yadav, Anuj Kumar +2 more
openaire +2 more sources
Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region
In this paper, we aim to study a -user quantum multiple access wiretap channel with an arbitrary number of wiretappers under one-shot setting. In this regard, we first introduce the general quantum multiple access wiretap channel and the simplified ...
Hadi Aghaee, Bahareh Akhbari
doaj
An Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement
The classical secret-key agreement (SKA) scheme includes three phases: (a) advantage distillation (AD), (b) reconciliation, and (c) privacy amplification.
Yan Feng +4 more
doaj +1 more source
Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing
We establish an upper bound on the rate of codes for a wiretap channel with public feedback for a fixed probability of error and secrecy parameter. As a corollary, we obtain a strong converse for the capacity of a degraded wiretap channel with public ...
Hayashi, Masahito +2 more
core +1 more source
Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel +3 more
core +2 more sources
Non-Additivity in Classical-Quantum Wiretap Channels [PDF]
Due to Csiszar and Koerner, the private capacity of classical wiretap channels has a single-letter characterization in terms of the private information. For quantum wiretap channels, however, it is known that regularization of the private information is necessary to reach the capacity.
Arkin Tikku +2 more
openaire +4 more sources
Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the ...
Chockalingam, A., Vishwakarma, Sanjay
core +1 more source
Source-Channel Secrecy with Causal Disclosure [PDF]
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul +3 more
core +1 more source

