On energy-secrecy trade-offs for Gaussian wiretap channels

C Comaniciu, HV Poor - IEEE transactions on information …, 2012 - ieeexplore.ieee.org
This paper investigates physical-layer security-energy trade-offs from an information
theoretic perspective. The metric of partial secrecy is introduced as the amount of distortion …

An efficient code for adversarial wiretap channel

P Wang, R Safavi-Naini - 2014 IEEE Information Theory …, 2014 - ieeexplore.ieee.org
In the (ρ r, ρ w)-adversarial wiretap (AWTP) channel model of [13], a codeword sent over the
communication channel is corrupted by an adversary who observes a fraction ρ r of the …

Imperfect secrecy in wiretap channel II

F Cheng, RW Yeung, KW Shum - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In a point-to-point communication system, which consists of a sender, a receiver, and a set of
noiseless channels, the sender wishes to transmit a private message to the receiver through …

Wiretap channels: Nonasymptotic fundamental limits

W Yang, RF Schaefer, HV Poor - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the maximal secret communication rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New achievability and …

A new wiretap channel model and its strong secrecy capacity

M Nafea, A Yener - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
In this paper, a new wiretap channel model is proposed, where the legitimate transmitter and
receiver communicate over a discrete memoryless channel. The wiretapper has perfect …

Secrecy capacity-memory tradeoff of erasure broadcast channels

S Kamel, M Sarkiss, M Wigger… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a
wiretap erasure broadcast channel (BC) with Kw weak receivers and Ks strong receivers …

An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels

L Kong, Y Ai, L Lei, G Kaddoum, S Chatzinotas… - EURASIP Journal on …, 2021 - Springer
Physical layer security (PLS) has been proposed to afford an extra layer of security on top of
the conventional cryptographic techniques. Unlike the conventional complexity-based …

Explicit capacity-achieving coding scheme for the Gaussian wiretap channel

H Tyagi, A Vardy - 2014 IEEE International Symposium on …, 2014 - ieeexplore.ieee.org
We extend the Bellare-Tessaro coding scheme for a discrete, degraded, symmetric wiretap
channel to a Gaussian wiretap channel. Denoting by SNR the signal-to-noise ratio of the …

Comparison of equivocation rate of finite-length codes for the wiretap channel

A Wickramasooriya, I Land… - SCC 2013; 9th …, 2013 - ieeexplore.ieee.org
This paper addresses the analysis of binary linear codes for the wiretap channel with focus
on binary erasure channels. We use a novel approach to measure the equivocation rate by …

[PDF][PDF] Secured communication over frequency-selective fading channels: A practical Vandermonde precoding

M Kobayashi, M Debbah, S Shamai - EURASIP Journal on Wireless …, 2009 - Springer
We study the frequency-selective broadcast channel with confidential messages (BCC)
where the transmitter sends a confidential message to receiver 1 and a common message to …