نتایج جستجو برای: secrecy capacity

تعداد نتایج: 282274  

2010
Eduard A. Jorswieck

Motivated by the two-user beamforming in multiantenna interference channels, we characterize the upper boundary of the achievable single-user gain-region. The eigenvector corresponding to the maximum eigenvalue of the weighted sum of Hermitian forms of channel vectors is shown to achieve all points on the boundary in some given direction. Thereby, we solve three different beamforming problems, ...

Journal: :IACR Cryptology ePrint Archive 2012
Mihir Bellare Stefano Tessaro

In the wiretap channel setting, one aims to get information-theoretic privacy of communicated data based only on the assumption that the channel from sender to adversary is noisier than the one from sender to receiver. The secrecy capacity is the optimal (highest possible) rate of a secure scheme, and the existence of schemes achieving it has been shown. For thirty years the ultimate and unreac...

2016
Jorge Munilla Mike Burmester Alberto Peinado Guomin Yang Willy Susilo

RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement t...

2011
Raef Bahi Bassily

Title of dissertation: ALIGNMENT AND COOPERATION FOR SECRECY IN MULTI-USER CHANNELS Raef Bassily Doctor of Philosophy, 2011 Dissertation directed by: Professor Şennur Ulukuş Department of Electrical and Computer Engineering The study of the physical layer has offered a new perspective to the problem of communication security. This led to the development of a vast set of ideas and techniques roo...

2017
Thanh V. Pham Anh T. Pham

This paper studies the information theoretic secrecy sum-rate for multi-user multiple-input single-output (MU-MISO) visible light communication (VLC) systems with confidential messages. The well-known Zero-Forcing (ZF) precoding method is employed to ensure confidentiality among legitimate users and, at the same time, to prevent eavesdropper(s) from obtaining any information. Different from rad...

2010
Ninoslav Marina Mérouane Debbah Are Hjørungnes Hesham El-Gamal

Physical layer security is an emerging security area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers. We investigate the interaction between the source that tra...

Journal: :IEICE Transactions 2014
Jinxiao Zhu Yulong Shen Xiaohong Jiang Osamu Takahashi Norio Shiratori

The fading channel model is seen as an important approach that can efficiently capture the basic time-varying properties of wireless channels, while physical layer security is a promising approach to providing a strong form of security. This paper focuses on the fundamental performance study of applying physical layer security to achieve secure and reliable information transmission over the fad...

Journal: :CoRR 2009
Ghadamali Bagherikaram Abolfazl S. Motahari Amir K. Khandani

In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages to two receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by the equivocation ra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید