An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

A channel under simultaneous jamming and eavesdropping attack—Correlated random coding capacities under strong secrecy criteria

M Wiese, J Nötzel, H Boche - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
We give a complete characterization of the correlated random coding secrecy capacity of
arbitrarily varying wiretap channels (AVWCs). We apply two alternative strong secrecy …

Covert communication in the presence of an uninformed, informed, and coordinated jammer

H ZivariFard, MR Bloch… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. This paper
investigates covert communication in the presence of a cooperative jammer. Covert …

Sufficiently myopic adversaries are blind

BK Dey, S Jaggi, M Langberg - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We consider a communication problem in which a sender, Alice, wishes to communicate
with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is …

Semantic security via seeded modular coding schemes and Ramanujan graphs

M Wiese, H Boche - IEEE Transactions on Information Theory, 2020 - ieeexplore.ieee.org
A novel type of functions called biregular irreducible functions is introduced and applied as
security components (instead of, eg, universal hash functions) in seeded modular wiretap …

Wiretap channels with random states non-causally available at the encoder

Z Goldfeld, P Cuff, HH Permuter - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state
information (CSI) at the encoder. This model subsumes all instances of CSI availability as …

Quadratically constrained myopic adversarial channels

Y Zhang, S Vatedka, S Jaggi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We study communication in the presence of a jamming adversary where quadratic power
constraints are imposed on the transmitter and the jammer. The jamming signal is allowed to …

Gaussian multiuser wiretap channels in the presence of a jammer-aided eavesdropper

RA Chou, A Yener - Entropy, 2022 - mdpi.com
This paper considers secure communication in the presence of an eavesdropper and a
malicious jammer. The jammer is assumed to be oblivious of the communication signals …

Strong secrecy of arbitrarily varying wiretap channel with constraints

Y Chen, D He, C Ying, Y Luo - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The strong secrecy transmission problem of the arbitrarily varying wiretap channel (AVWC)
with input and state constraints is investigated in this paper. First, a stochastic-encoder code …

Key and message semantic-security over state-dependent channels

A Bunin, Z Goldfeld, HH Permuter… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
We study the trade-off between secret message (SM) and secret key (SK) rates,
simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non …