Wiretap channels: Nonasymptotic fundamental limits

W Yang, RF Schaefer, HV Poor - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the maximal secret communication rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New achievability and …

Finite-blocklength bounds for wiretap channels

W Yang, RF Schaefer, HV Poor - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability
and secrecy constraints at a given blocklength. New achievability and converse bounds are …

-Resolvability

J Liu, P Cuff, S Verdú - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
The conventional channel resolvability refers to the minimum rate needed for an input
process to approximate the channel output distribution in total variation distance. In this …

Randomized quantization with exact error distribution

M Hegazy, CT Li - 2022 IEEE Information Theory Workshop …, 2022 - ieeexplore.ieee.org
We design a randomized scalar quantization scheme, where the quantization error is
independent of the source and follows any given unimodal distribution (eg Gaussian …

Information theory from a functional viewpoint

J Liu - 2018 - search.proquest.com
A perennial theme of information theory is to find new methods to determine the fundamental
limits of various communication systems, which potentially helps the engineers to find better …

One-shot variable-length secret key agreement approaching mutual information

CT Li, V Anantharam - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
This paper studies an information-theoretic one-shot variable-length secret key agreement
problem with public discussion. Let X and Y be jointly distributed random variables, each …

Broadcast channels with privacy leakage constraints

Z Goldfeld, G Kramer… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The broadcast channel (BC) with one common and two private messages with leakage
constraints is studied, where leakage rate refers to the normalized mutual information …

Wiretap and gelfand-pinsker channels analogy and its applications

Z Goldfeld, HH Permuter - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
An analogy framework between wiretap channels (WTCs) and state-dependent point-to-
point channels with non-causal encoder channel state information (referred to as Gelfand …

A Useful Analogy Between Wiretap and Gelfand-Pinsker Channels

Z Goldfeld, HH Permuter - 2018 IEEE International Symposium …, 2018 - ieeexplore.ieee.org
A framework of analogy between wiretap channels (WTCs) and state-dependent point-to-
point channels with noncausal encoder channel state information (referred to as Gelfand …

Sharp bounds for mutual covering

J Liu, MH Yassaee, S Verdú - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A fundamental tool in network information theory is the covering lemma, which lower bounds
the probability that there exists a pair of random variables; among a given number of …