نتایج جستجو برای: secrecy capacity

تعداد نتایج: 282274  

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Yingbin Liang Gerhard Kramer H. Vincent Poor Shlomo Shamai

This paper considers the compound wiretap channel, which generalizes Wyner’s wiretap model to allow the channels to the (legitimate) receiver and to the eavesdropper to take a number of possible states. No matter which states occur, the transmitter guarantees that the receiver decodes its message and that the eavesdropper is kept in full ignorance about the message. The compound wiretap channel...

Journal: :Ad Hoc Networks 2014
Jinxiao Zhu Yin Chen Yulong Shen Osamu Takahashi Xiaohong Jiang Norio Shiratori

This paper considers the transmission of confidential messages over noisy wireless ad hoc networks, where both background noise and interference from concurrent transmitters affect the received signals. For the random networks where the legitimate nodes and the eavesdroppers are distributed as Poisson point processes, we study the secrecy transmission capacity (STC), as well as the connection o...

2011
Laura Luzzi Matthieu R. Bloch

ABSTRACT In this paper, we investigate the limitations of capacity-based random code constructions for the wiretap channel, i.e., constructions that associate to each confidential message a subcode whose rate approaches the capacity of the eavesdropper’s channel. Generalizing a previous result for binary symmetric channels, we show that random capacity-based codes do not achieve the strong secr...

Journal: :CoRR 2004
Andrew Thangaraj Souvik Dihidar A. Robert Calderbank Steven W. McLaughlin Jean-Marc Merolla

With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical error-correcting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspecti...

Journal: :CoRR 2006
Yingbin Liang H. Vincent Poor

Abstract— A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs. It is assume...

Journal: :IEEE Trans. Information Theory 1995
Charles H. Bennett Gilles Brassard Claude Crépeau Ueli Maurer

~ This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard and Robert [l] for a special scenario. The results have applications to unconditionally-secure secret-key agreement protocols, quantum cryptography and to a non-asymptotic and constructive treatment of the secrecy capacity of wire-tap and broadcast channels, even fo...

Journal: :CoRR 2007
Yingbin Liang H. Vincent Poor

Abstract— A generalized multiple access channel (GMAC) with one confidential message set is studied, where two users (users 1 and 2) attempt to transmit common information to a destination, and user 1 also has confidential information intended for the destination. Moreover, user 1 wishes to keep its confidential information as secret as possible from user 2. A deterministic GMAC is first studie...

2013
Nicolas Schrammar

In this thesis we study wireless networks modeled by the additive white Gaussian noise (AWGN) model. The AWGN capacity region of most network topologies is unknown, which means that the optimal transmission scheme is unknown as well. This motivates the search for capacity approximations and for approximately optimal schemes. Deterministic channel models have been proposed as means to approximat...

Journal: :IEEE Transactions on Information Theory 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید