Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration

S Agrawal, Y Ishai, E Kushilevitz, V Narayanan… - Advances in Cryptology …, 2021 - Springer
Can a sender encode a pair of messages (m_0, m_1)(m 0, m 1) jointly, and send their
encoding over (say) a binary erasure channel, so that the receiver can decode exactly one …

Free-space optical wiretap channel and experimental secret key agreement in 7.8 km terrestrial link

M Fujiwara, T Ito, M Kitamura, H Endo, O Tsuzuki… - Optics express, 2018 - opg.optica.org
Secret key agreement using physical properties of a wireless channel is becoming a
promising scheme to establish a secret key between two users, especially in short-distance …

Secure short-packet transmission in uplink massive MU-MIMO assisted URLLC under imperfect CSI

T Yu, X Sun, Y Cai, Z Zhu - China Communications, 2023 - ieeexplore.ieee.org
Ultra-reliable and low-latency communication (URLLC) is still in the early stage of research
due to its two strict and conflicting requirements, ie, ultra-low latency and ultra-high …

Computational wiretap coding from indistinguishability obfuscation

Y Ishai, A Jain, P Lou, A Sahai, M Zhandry - Annual international …, 2023 - Springer
A wiretap coding scheme for a pair of noisy channels (ChB, ChE) enables Alice to reliably
communicate a message to Bob by sending its encoding over ChB, while hiding the …

Physical layer security in massive MIMO systems

RF Schaefer, G Amarasuriya… - 2017 51st Asilomar …, 2017 - ieeexplore.ieee.org
An overview over secure communication in massive multiple-input multiple-output (MIMO)
systems is presented. A massive MIMO base-station serves multiple user nodes by …

Cooperative transmission strategy for industrial IoT against interference attacks

A Farraj - 2023 IEEE Texas Power and Energy Conference …, 2023 - ieeexplore.ieee.org
This article considers a physical layer-based security strategy to achieve specifics cyber
security target levels for resource-constrained industrial Internet of Things (IoT) devices …

Guaranteed Private Communication with Secret Block Structure

MF Da Costa, J Li, U Mitra - arXiv preprint arXiv:2309.12949, 2023 - arxiv.org
A novel private communication framework is proposed where privacy is induced by
transmitting over channel instances of linear inverse problems that are identifiable to the …

Physical layer security in fiber-optic MIMO-SDM systems: An overview

K Guan, J Cho, PJ Winzer - Optics Communications, 2018 - Elsevier
Fiber-optic transmission systems provide large capacities over enormous distances but are
vulnerable to simple eavesdropping attacks at the physical layer. We classify key-based and …

Amplitude constrained vector Gaussian wiretap channel: Properties of the secrecy-capacity-achieving input distribution

A Favano, L Barletta, A Dytso - Entropy, 2023 - mdpi.com
This paper studies the secrecy capacity of an n-dimensional Gaussian wiretap channel
under a peak power constraint. This work determines the largest peak power constraint R¯ …

Joint obstacle avoidance and 3D deployment for securing UAV-enabled cellular communications

D Wang, Y Yang - IEEE Access, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) can enable cellular mobile communications in unexpected
or temporary scenarios, but there are information security problems raised in such …