Informational Theoretical Security based on Noisy Channels

نویسنده

  • Allan Rasmussen
چکیده

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Discrete Memoryless Channels . . . . . . . . . . . . . . . . . . . . . . . . 2 The Binary Symmetric Channel . . . . . . . . . . . . . . . . . . . . . . . 4 Secrecy Capacity of a Channel . . . . . . . . . . . . . . . . . . . . . . . . 9 Secret Key Agreement Rate by Public Discussion . . . . . . . . . . . . . 17 On the Applicability of the Shown Results . . . . . . . . . . . . . . . . . 22

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coding for Relay Networks and Effective Secrecy for Wire-tap Channels

This thesis addresses two problems of network information theory: coding for relay networks and (accurate) approximations of distributions based on unnormalized informational divergence with applications to network security. For the former problem, we first consider short message noisy network coding (SNNC). SNNC differs from long message noisy network coding (LNNC) in that one transmits many s...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Informational Channels of Financial Contagion

Two main classes of channels have been studied as informational sources of financial contagion. One is a fundamental channel that is based on real and financial links between economies, and the second is a social learning channel that arises when agents base their decisions on noisy observations about the actions of agents in foreign markets. Using global games, I present a two country model of...

متن کامل

Stegosystems Based on Noisy Channels

Resumen We propose a significant deviation from the standard steganography problem formulation. Here, an attacker is able to receive a stegosignal only over noisy channels. There may be also situations in which the presence of a noisy channel is simulated by a designer of the stegosystem to hide secret messages. Two models of noisy channels are considered: binary symmetric channel (BSC) and add...

متن کامل

Optimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels

Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009