نتایج جستجو برای: eavesdropper attack

تعداد نتایج: 81837  

2007
João Barros

Quantum information theory is widely recognized as an arguably powerful paradigm for physically secure communications. In general, any attack that an eavesdropper, say Eve, perpetrates in order to gain access to messages or keys exchanged by the legitimate parties, say Alice and Bob, will result in disturbances to quantum states that can be detected with overwhelming probability — security is g...

Journal: :CoRR 2018
Chong Li Yingbin Liang H. Vincent Poor Shlomo Shamai

In this paper, the k-th order autoregressive moving average (ARMA(k)) Gaussian wiretap channel with noiseless causal feedback is considered, in which an eavesdropper receives noisy observations of the signals in both forward and feedback channels. It is shown that a variant of the generalized Schalkwijk-Kailath scheme, a capacity-achieving coding scheme for the feedback Gaussian channel, achiev...

2007
Ender Tekin Aylin Yener

We consider a two-user multiple-access wiretap channel that undergoes ergodic block fading. In this scenario, there are two users are communicating with a base station in the presence of an eavesdropper, who has access to the communications through a multiple-access channel. We assume independent fading for each block, and that the fading process is ergodic. We also assume that the channel gain...

2012
Mohammad Rakibul Islam

In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input m...

Journal: :Mathematics 2022

In 2021, Chang et al. proposed an authenticated semi-quantum key-distribution (ASQKD) protocol using single photons and channel. However, eavesdropper can launch a reflective attack to forge the receiver’s identity without being detected. addition, al.’s ASQKD assumes classical channel between sender receiver. It is considered illogical have in protocol. If these security issues are not address...

Journal: :CoRR 2016
Ankit Singh Rawat

This short note revisits the problem of designing secure minimum storage regenerating (MSR) codes for distributed storage systems. A secure MSR code ensures that a distributed storage system does not reveal the stored information to a passive eavesdropper. The eavesdropper is assumed to have access to the content stored on l1 number of storage nodes in the system and the data downloaded during ...

2007
Frédérique Oggier Babak Hassibi

We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of informat...

2001
Mihir Bellare Alexandra Boldyreva Anand Desai David Pointcheval

We consider a novel security requirement of encryption schemes that we call “key-privacy” or “anonymity”. It asks that an eavesdropper in possession of a ciphertext not be able to tell which specific key, out of a set of known public keys, is the one under which the ciphertext was created, meaning the receiver is anonymous from the point of view of the adversary. We investigate the anonymity of...

Journal: :CoRR 2018
Hui-Ming Wang Ke-Wen Huang Theodoros A. Tsiftsis

Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید