Results 51 to 60 of about 6,771 (265)
Randomized Convolutional Codes for the Wiretap Channel [PDF]
We study application of convolutional codes to the randomized encoding scheme introduced by Wyner as a way of confusing the eavesdropper over a wiretap channel. We describe optimal and practical sub-optimal decoders for the main and the eavesdropper’s channels, and estimate the security gap, which is used as the main metric.
Alireza Nooraiepour, Tolga M. Duman
openaire +3 more sources
Exact Random Coding Secrecy Exponents for the Wiretap Channel
We analyze the exact exponential decay rate of the expected amount of information leaked to the wiretapper in Wyner's wiretap channel setting using wiretap channel codes constructed from both i.i.d. and constant-composition random codes. Our analysis for
Merhav, Neri +2 more
core +1 more source
Strong secrecy for erasure wiretap channels [PDF]
Submitted to the Information Theory Workship (ITW) 2010 ...
Ananda Theertha Suresh +4 more
openaire +2 more sources
A New Physical Layer Security Scheme Based on Adaptive Bit Channel Selection for Polar-Coded OFDM
We propose a new physical layer security scheme for a wiretap channel in polar-coded OFDM-based wireless communication systems. Our approach is based on the adaptive bit channel selection, where the input bit channels of polar code are selected according
Yuki Kuraya, Hideki Ochiai
doaj +1 more source
Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint [PDF]
This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support.
Alomair, Basel +3 more
core +2 more sources
When an eavesdropper performs an optical beam-splitting attack in a free-space optical communications channel, it is referred to as an optical wiretap channel, which is an extension of Wyner's wiretap channel model.
Tyan-Lin Wang, Ivan B. Djordjevic
doaj +1 more source
The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap.
Aleksey S. Gvozdarev +1 more
doaj +1 more source
Achieving Secrecy Capacity of the Gaussian Wiretap Channel with Polar Lattices
In this work, an explicit wiretap coding scheme based on polar lattices is proposed to achieve the secrecy capacity of the additive white Gaussian noise (AWGN) wiretap channel.
Ling, Cong, Liu, Ling, Yan, Yanfei
core +1 more source
A Cryptographic Treatment of the Wiretap Channel
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is "noisier" than the channel from sender to receiver. It has been the subject of decades of work in the information and coding (I&C) community. This paper bridges the
Mihir Bellare +2 more
openaire +3 more sources
Classical -Quantum Multiple Access Channel with Secrecy Constraint: One-shot Rate Region
In this paper, we aim to study a -user quantum multiple access wiretap channel with an arbitrary number of wiretappers under one-shot setting. In this regard, we first introduce the general quantum multiple access wiretap channel and the simplified ...
Hadi Aghaee, Bahareh Akhbari
doaj

