Results 51 to 60 of about 6,771 (265)

Randomized Convolutional Codes for the Wiretap Channel [PDF]

open access: yesIEEE Transactions on Communications, 2017
We study application of convolutional codes to the randomized encoding scheme introduced by Wyner as a way of confusing the eavesdropper over a wiretap channel. We describe optimal and practical sub-optimal decoders for the main and the eavesdropper’s channels, and estimate the security gap, which is used as the main metric.
Alireza Nooraiepour, Tolga M. Duman
openaire   +3 more sources

Exact Random Coding Secrecy Exponents for the Wiretap Channel

open access: yes, 2016
We analyze the exact exponential decay rate of the expected amount of information leaked to the wiretapper in Wyner's wiretap channel setting using wiretap channel codes constructed from both i.i.d. and constant-composition random codes. Our analysis for
Merhav, Neri   +2 more
core   +1 more source

Strong secrecy for erasure wiretap channels [PDF]

open access: yes2010 IEEE Information Theory Workshop, 2010
Submitted to the Information Theory Workship (ITW) 2010 ...
Ananda Theertha Suresh   +4 more
openaire   +2 more sources

A New Physical Layer Security Scheme Based on Adaptive Bit Channel Selection for Polar-Coded OFDM

open access: yesIEEE Open Journal of Vehicular Technology
We propose a new physical layer security scheme for a wiretap channel in polar-coded OFDM-based wireless communication systems. Our approach is based on the adaptive bit channel selection, where the input bit channels of polar code are selected according
Yuki Kuraya, Hideki Ochiai
doaj   +1 more source

Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]

open access: yes, 2016
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel   +3 more
core   +2 more sources

Physical-Layer Security of a Binary Data Sequence Transmitted With Bessel–Gaussian Beams Over an Optical Wiretap Channel

open access: yesIEEE Photonics Journal, 2018
When an eavesdropper performs an optical beam-splitting attack in a free-space optical communications channel, it is referred to as an optical wiretap channel, which is an extension of Wyner's wiretap channel model.
Tyan-Lin Wang, Ivan B. Djordjevic
doaj   +1 more source

On the Physical Layer Security Peculiarities of Wireless Communications in the Presence of the Beaulieu-Xie Shadowed Fading

open access: yesMathematics, 2022
The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap.
Aleksey S. Gvozdarev   +1 more
doaj   +1 more source

Achieving Secrecy Capacity of the Gaussian Wiretap Channel with Polar Lattices

open access: yes, 2017
In this work, an explicit wiretap coding scheme based on polar lattices is proposed to achieve the secrecy capacity of the additive white Gaussian noise (AWGN) wiretap channel.
Ling, Cong, Liu, Ling, Yan, Yanfei
core   +1 more source

A Cryptographic Treatment of the Wiretap Channel

open access: yesIACR Cryptol. ePrint Arch., 2012
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than the channel from sender to receiver. It has been the subject of decades of work in the information and coding (I&C) community. This paper bridges the
Mihir Bellare   +2 more
openaire   +3 more sources

Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region

open access: yesInternational Journal of Information and Communication Technology Research, 2020
In this paper, we aim to study a -user quantum multiple access wiretap channel with an arbitrary number of wiretappers under one-shot setting. In this regard, we first introduce the general quantum multiple access wiretap channel and the simplified ...
Hadi Aghaee, Bahareh Akhbari
doaj  

Home - About - Disclaimer - Privacy