Informational Theoretical Security based on Noisy Channels
نویسنده
چکیده
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Discrete Memoryless Channels . . . . . . . . . . . . . . . . . . . . . . . . 2 The Binary Symmetric Channel . . . . . . . . . . . . . . . . . . . . . . . 4 Secrecy Capacity of a Channel . . . . . . . . . . . . . . . . . . . . . . . . 9 Secret Key Agreement Rate by Public Discussion . . . . . . . . . . . . . 17 On the Applicability of the Shown Results . . . . . . . . . . . . . . . . . 22
منابع مشابه
Coding for Relay Networks and Effective Secrecy for Wire-tap Channels
This thesis addresses two problems of network information theory: coding for relay networks and (accurate) approximations of distributions based on unnormalized informational divergence with applications to network security. For the former problem, we first consider short message noisy network coding (SNNC). SNNC differs from long message noisy network coding (LNNC) in that one transmits many s...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملInformational Channels of Financial Contagion
Two main classes of channels have been studied as informational sources of financial contagion. One is a fundamental channel that is based on real and financial links between economies, and the second is a social learning channel that arises when agents base their decisions on noisy observations about the actions of agents in foreign markets. Using global games, I present a two country model of...
متن کاملStegosystems Based on Noisy Channels
Resumen We propose a significant deviation from the standard steganography problem formulation. Here, an attacker is able to receive a stegosignal only over noisy channels. There may be also situations in which the presence of a noisy channel is simulated by a designer of the stegosystem to hide secret messages. Two models of noisy channels are considered: binary symmetric channel (BSC) and add...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009