Semantically secure lattice codes for the Gaussian wiretap channel

C Ling, L Luzzi, JC Belfiore… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We propose a new scheme of wiretap lattice coding that achieves semantic security and
strong secrecy over the Gaussian wiretap channel. The key tool in our security proof is the …

Strong secrecy from channel resolvability

MR Bloch, JN Laneman - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
We analyze physical-layer security based on the premise that the coding mechanism for
secrecy over noisy channels is tied to the notion of channel resolvability. Instead of …

Secure multiplex coding with dependent and non-uniform multiple messages

M Hayashi, R Matsumoto - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
The secure multiplex coding (SMC) is a technique to remove rate loss in the coding for wire-
tap channels and broadcast channels with confidential messages caused by the inclusion of …

Strong coordination with polar codes

MR Bloch, L Luzzi, J Kliewer - 2012 50th Annual Allerton …, 2012 - ieeexplore.ieee.org
In this paper, we design explicit codes for strong coordination in two-node networks.
Specifically, we consider a two-node network in which the action imposed by nature is …

Achieving strong security based on fountain code with coset pre‐coding

M Yi, X Ji, K Huang, H Wen, B Wu - IET Communications, 2014 - Wiley Online Library
This study proposes an approach for achieving strong communication security based on
explosive fountain code with coset pre‐coding, where both main and wire‐tap channels are …

A New Achievable Region of the -User MAC Wiretap Channel with Confidential and Open Messages Under Strong Secrecy

H Xu, KK Wong, G Caire - arXiv preprint arXiv:2407.02442, 2024 - arxiv.org
This paper investigates the achievable region of a $ K $-user discrete memoryless (DM)
multiple access wiretap (MAC-WT) channel, where each user transmits both secret and …

[PDF][PDF] Secrecy from resolvability

MR Bloch, JN Laneman - Proc. IEEE Trans. Inf. Theory, 2011 - Citeseer
We investigate an approach to physical-layer security based on the premise that the coding
mechanism for secrecy over noisy channels is fundamentally tied to the notion of …

Lattice codes achieving strong secrecy over the mod-Λ Gaussian channel

C Ling, L Luzzi, JC Belfiore - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
We consider a wiretap scenario where the main channel and eavesdropper's channel are
modulo lattice Gaussian channels. We prove that nested lattice codes can achieve strong …

Identification under effective secrecy

A Ibrahim, R Ferrara, C Deppe - 2021 IEEE Information Theory …, 2021 - ieeexplore.ieee.org
We study the problem of identification over a DMC wiretap channel under effective secrecy.
In identification, due to the fact that single messages are compared to each other, all …

Broadcast channels with confidential messages by randomness constrained stochastic encoder

S Watanabe, Y Oohama - 2012 IEEE International Symposium …, 2012 - ieeexplore.ieee.org
In coding schemes for the wire-tap channel or the broadcast channels with confidential
messages, it is well known that the sender needs to use a stochastic encoding to avoid the …