Reliable and perfectly secret communication over the generalized Ozarow-Wyner’s wire-tap channel

Computer Networks - Tập 109 - Trang 21-30 - 2016
Giulio Aliberti1,2, Roberto Di Pietro1,3, Stefano Guarino4
1Security Research, Nokia Bell Labs, Paris, France
2Università di Roma Tre, Dip.to di Matematica, Roma, Italy
3Università di Padova, Dip.to di Matematica, Padova, Italy
4Istituto per le Applicazioni del Calcolo “Mauro Picone” (IAC), Consiglio Nazionale delle Ricerche (CNR), Italy

Tài liệu tham khảo

Harrison, 2009, Physical-layer security: combining error control coding and cryptography, 1 Wyner, 1975, The Wire-tap Channel, Bell Syst. Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x Ozarow, 1985, Wire-tap channel II, vol. 209, 33 Nafea, 2015, Wiretap channel ii with a noisy main channel, 1159 Dodis, 2001, On perfect and adaptive security in exposure-resilient cryptography., vol. 2045, 301 Cheraghchi, 2012, Invertible extractors and wiretap protocols, Inf. Theor. IEEE Trans., 58, 1254, 10.1109/TIT.2011.2170660 Bloch, 2011 Shamir, 1979, How to share a secret, Commun. ACM, 22, 612, 10.1145/359168.359176 Oggier, 2011, The secrecy capacity of the mimo wiretap channel, Inf. Theor. IEEE Trans., 57, 4961, 10.1109/TIT.2011.2158487 Blakley, 1979, Safeguarding cryptographic keys, 313 Zou, 2015, Improving physical-layer security in wireless communications using diversity techniques, Netw. IEEE, 29, 42, 10.1109/MNET.2015.7018202 Csiszár, 1978, Broadcast channels with confidential messages., IEEE Trans. Inf. Theor., 24, 339, 10.1109/TIT.1978.1055892 Leung-Yan-Cheong, 1978, The gaussian wire-tap channel, Inf. Theor. IEEE Trans., 24, 451, 10.1109/TIT.1978.1055917 Maurer, 1994, The strong secret key rate of discrete random triples, vol. 276, 271 Maurer, 2000, Information-theoretic key agreement: From weak to strong secrecy for free, 1807, 351 Harrison, 2013, Coding for secrecy: An overview of error-control coding techniques for physical-layer security., IEEE Signal Process. Mag., 30, 41, 10.1109/MSP.2013.2265141 Boche, 2015, On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels, IEEE Trans. Inf. Foren. Security, 10, 2531, 10.1109/TIFS.2015.2465937 Benammar, 2015, Secrecy capacity region of some classes of wiretap broadcast channels., IEEE Trans. Inf. Theor., 61, 5564, 10.1109/TIT.2015.2463279 Rezki, 2014, On the secrecy capacity of the wiretap channel with imperfect main channel estimation, Commun. IEEE Trans., 62, 3652, 10.1109/TCOMM.2014.2356482 Han, 2014, Reliability and secrecy functions of the wiretap channel under cost constraint, Inf. Theor. IEEE Trans., 60, 6819, 10.1109/TIT.2014.2355811 Subramanian, 2011, Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes., IEEE Trans. Inf. Foren. Security, 6, 585, 10.1109/TIFS.2011.2148715 Mahdavifar, 2011, Achieving the secrecy capacity of wiretap channels using polar codes, Inf. Theor. IEEE Trans., 57, 6428, 10.1109/TIT.2011.2162275 Klinc, 2011, LDPC codes for the gaussian wiretap channel., IEEE Trans. Inf. Forens. Security, 6, 532, 10.1109/TIFS.2011.2134093 Liu, 2015, Achieving secrecy capacity of the gaussian wiretap channel with polar lattices, CoRR Boutros, 2014 Gulcu, 2015, Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component, 1 Cramer, 2015, Linear secret sharing schemes from error correcting codes and universal hash functions., vol. 9057, 313 Zou, 2015, An information theoretic approach to secret sharing, IEEE Trans. Inf. Theor., 61, 3121, 10.1109/TIT.2015.2421905 Rivest, 1997, All-or-nothing encryption and the package transform., vol. 1267, 210 Resch, 2011, AONT-RS: blending security and performance in dispersed storage systems, 191 Bellare, 2012, Semantic security for the wiretap channel., vol. 7417, 294 Wang, 2016, A model for adversarial wiretap channels, IEEE Trans. Inf. Theor., 62, 970, 10.1109/TIT.2015.2503766 Wong, 2011, Secret-sharing LDPC codes for the bpsk-constrained gaussian wiretap channel, IEEE Trans. Inf. Foren. Security, 6, 551, 10.1109/TIFS.2011.2139208 Baldi, 2015, Performance assessment and design of finite length LDPC codes for the gaussian wiretap channel, 435 Liang, 2006, Generalized multiple access channels with confidential messages, CoRR Cheng, 2015, Imperfect secrecy in wiretap channel ii, Inf. Theor. IEEE Trans., 61, 628, 10.1109/TIT.2014.2366102 Wei, 1991, Generalized hamming weights for linear codes, Inf. Theor. IEEE Trans., 37, 1412, 10.1109/18.133259 Thangaraj, 2007, Applications of LDPC codes to the wiretap channel., IEEE Trans. Inf. Theor., 53, 2933, 10.1109/TIT.2007.901143