نتایج جستجو برای: perfect secrecy

تعداد نتایج: 50745  

2010
Ninoslav Marina Mérouane Debbah Are Hjørungnes Hesham El-Gamal

Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between the source that tra...

Journal: :CoRR 2016
Shiqi Gong Chengwen Xing Zesong Fei Sheng Chen

In this paper we propose a comprehensive framework exploiting the polarization sensitive array (PLA) to improve the physical layer security of wireless communications. More specifically, the polarization difference among signals are utilized to improve the secrecy rate of wireless communications, especially when these signals are spatially indistinguishable. We firstly investigate the PLA based...

Journal: :IACR Cryptology ePrint Archive 2013
B. Ya. Ryabko

The Vernam cipher (or one-time pad) has played an important rule in cryptography because it is a perfect secrecy system. For example, if an English text (presented in binary system) X1X2... is enciphered according to the formula Zi = (Xi + Yi) mod 2, where Y1Y2... is a key sequence generated by the Bernoulli source with equal probabilities of 0 and 1, anyone who knows Z1Z2... has no information...

2010
Zhu Han Ninoslav Marina Mérouane Debbah Are Hjørungnes

Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. Here, we investiga...

Journal: :IACR Cryptology ePrint Archive 2012
Martin Hirt Christoph Lucas Ueli Maurer Dominik Raub

The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. For this purpose, a fixed set of n parties runs a protocol that tolerates an adversary corrupting a subset of the parties, preserving certain security guarantees like correctness, secrecy, robustness, and fairness. Corruptions can be either passive or active: A pas...

Journal: :CoRR 2007
Ashish Khisti Aslan Tchamkerten Gregory W. Wornell

Wyner’s wiretap channel is extended to parallel broadcast channels and fading channels with multiple receivers. In the first part of the paper, we consider the setup of parallel broadcast channels with one sender, multiple intended receivers, and one eavesdropper. We study the situations where the sender broadcasts either a common message or independent messages to the intended receivers. We de...

Journal: :CoRR 2013
Pin-Hsun Lin Chien-Li Su Hsuan-Jung Su

In wiretap channels the eavesdropper's channel state information (CSI) is commonly assumed to be known at transmitter, fully or partially. However, under perfect secrecy constraint the eavesdropper may not be motivated to feedback any correct CSI. In this paper we consider a more feasible problem for the transmitter to have eavesdropper's CSI. That is, the fast fading multiple-antenna Gaussian ...

Journal: :Discrete Mathematics 2011
Nicolas Trotignon Kristina Vuskovic

Roussel and Rubio proved a lemma which is essential in the proof of the Strong Perfect Graph Theorem. We give a new short proof of the main case of this lemma. In this note, we also give a short proof of Hayward’s decomposition theorem for weakly chordal graphs, relying on a Roussel–Rubio-type lemma. We recall how Roussel–Rubio-type lemmas yield very short proofs of the existence of even pairs ...

Journal: :CoRR 2017
Anastasios Tsiamis Konstantinos Gatsis George J. Pappas

In this paper, we study the problem of remote state estimation, in the presence of a passive eavesdropper. An authorized user estimates the state of an unstable linear plant, based on the packets received from a sensor, while the packets may also be intercepted by the eavesdropper. Our goal is to design a coding scheme at the sensor, which encodes the state information, in order to impair the e...

Journal: :CoRR 2015
Hong Xing Kai-Kit Wong Zheng Chu Arumugam Nallanathan

Cooperative jamming has been demonstrated to be an effective means to provide secret wireless communications and yet this is realized at the expense of the power consumption of the friendly jammers. This paper considers the scenario where friendly jammers harvest energy wirelessly from the signal transmitted by the source, and then use only the harvested energy to transmit the jamming signals f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید