An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

How deep the theory of quantum communications goes: Superadditivity, superactivation and causal activation

S Koudia, AS Cacciapuoti, K Simonov… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
In the theory of quantum communications, a deeper structure has been recently unveiled,
showing that the capacity does not completely characterize the channel ability to transmit …

The arbitrarily varying wiretap channel—Secret randomness, stability, and super-activation

J Nötzel, M Wiese, H Boche - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
We define the common randomness-assisted capacity of an arbitrarily varying wiretap
channel (AVWC) when the eavesdropper is kept ignorant about the common randomness …

Physical layer service integration in wireless networks: Signal processing challenges

RF Schaefer, H Boche - IEEE Signal Processing Magazine, 2014 - ieeexplore.ieee.org
It is becoming more important that next-generation wireless networks wisely integrate
multiple services at the physical layer to increase spectral efficiency. In this article, physical …

Secure communication under channel uncertainty and adversarial attacks

RF Schaefer, H Boche, HV Poor - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Information theoretic approaches to security have been examined as a promising
complement to current cryptographic techniques. Such information theoretic approaches …

[HTML][HTML] Quantum broadcast channels with cooperating decoders: An information-theoretic perspective on quantum repeaters

U Pereg, C Deppe, H Boche - Journal of Mathematical Physics, 2021 - pubs.aip.org
Communication over a quantum broadcast channel with cooperation between the receivers
is considered. The first form of cooperation addressed is classical conferencing, where …

On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels

H Boche, RF Schaefer, HV Poor - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The wiretap channel models secure communication between two users in the presence of
an eavesdropper who must be kept ignorant of transmitted messages. The performance of …

Performance analysis of secure communications over dual correlated Rician fading channels

KN Le - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
Wireless secrecy under dual correlated Rician fading environments is theoretically studied
for correlated source-destination and source-wiretapper channels. Without considering …

A model for adversarial wiretap channels

P Wang, R Safavi-Naini - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In the wiretap model of secure communication, Alice is connected to Bob over a noisy
channel that is eavesdropped by Eve. The goal is to provide (asymptotic) reliability and …

Identification capacity of channels with feedback: Discontinuity behavior, super-activation, and Turing computability

H Boche, RF Schaefer, HV Poor - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The problem of identification is considered, in which it is of interest for the receiver to decide
only whether a certain message has been sent or not, and the identification-feedback (IDF) …