نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

Journal: :CoRR 2012
Peng Xu Zhiguo Ding Xuchu Dai Kin K. Leung

In this paper, we consider the design of a new secrecy transmission scheme for a four-node relay-eavesdropper channel. The key idea of the proposed scheme is to combine noisy network coding with the interference assisted strategy for wiretap channel with a helping interferer. A new achievable secrecy rate is characterized for both discrete memoryless and Gaussian channels. Such a new rate can b...

Journal: :CoRR 2010
G. D. Raghava B. Sundar Rajan

The secrecy capacity of a discrete memoryless Gaussian Wire-Tap Channel when the input is from a finite complex constellation is studied. It is shown that the secrecy capacity curves of a finite constellation plotted against the SNR, for a fixed noise variance of the eavesdropper’s channel has a global maximum at an internal point. This is in contrast to what is known in the case of Gaussian co...

2005
Xiaohua Li Mo Chen E. Paul Ratazzi

In contrast to the pessimistic view on perfect secrecy, studies on information-theoretic secrecy have shown that perfect secrecy may be possible in practice. A typical example is the Wyner’s wire-tap channel concept. However, existing approaches mostly depend on unrealistic noise or error-rate assumptions. We propose a more practical way in this paper which uses advanced space-time transmission...

2005
Andrew Thangaraj

With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical errorcorrecting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspectiv...

Journal: :Entropy 2014
Bin Dai Zheng Ma

In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specifically, first, we investigate the degraded MAC-WT, where two users transmit their corresponding confidential messages (no common message) to a legitimate receiver via a multiple-access channel (MAC), while a wiretapper wishes to obtain the messages via a physically degraded wiretap channel. The s...

Journal: :CoRR 2018
Ching-Yi Lai Kai-Min Chung

The famous Shannon impossibility result says that any encryption scheme with perfect secrecy requires a secret key at least as long as the message. In this paper we prove its quantum analogue with imperfect secrecy and imperfect correctness. We also provide a systematic study of information-theoretically secure quantum encryption with two secrecy definitions.

Journal: :Communications of the ACM 2018

Journal: :Index on Censorship 1988

Journal: :Chemical & Engineering News Archive 1996

Journal: :West European Politics 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید