A model for adversarial wiretap channels

P Wang, R Safavi-Naini - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In the wiretap model of secure communication, Alice is connected to Bob over a noisy
channel that is eavesdropped by Eve. The goal is to provide (asymptotic) reliability and …

Optimal Information Security Against Limited-View Adversaries: The Benefits of Causality and Feedback

M Bakshi, S Kadhe, Q Zhang, S Jaggi… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
The Singleton bound provides a fundamental limit on the maximum possible size of an error-
correcting code of a given length and distance. However, recent work by Zhang et. al.[IEEE …

Private Randomness Agreement and its Application in Quantum Key Distribution Networks

RB Christensen, P Popovski - IEEE Communications Letters, 2022 - ieeexplore.ieee.org
We define a variation on the well-known problem of private message transmission. This new
problem called private randomness agreement (PRA) gives two participants access to a …

Optimal Information Security Against Limited-view Adversaries: Beyond MDS Codes

Q Zhang, S Kadhe, M Bakshi, S Jaggi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Maximum distance separable (MDS) codes are often considered to have the optimal error
correction capability against malicious adversaries because they achieve the Singleton …

Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission

J Wu, DR Stinson - IEEE Transactions on Dependable and …, 2010 - ieeexplore.ieee.org
In this paper, we propose a security model to capture active attacks against multipath key
establishment (MPKE) in sensor networks. Our model strengthens previous models to …

Coding against a limited-view adversary: The effect of causality and feedback

Q Zhang, S Kadhe, M Bakshi, S Jaggi… - … on Information Theory …, 2015 - ieeexplore.ieee.org
We consider the problem of communication over a multi-path network in the presence of a
causal adversary. The limited-view causal adversary is able to, based on the current and …

On optimal secure message transmission by public discussion

H Shi, S Jiang, R Safavi-Naini… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
In a secure message transmission (SMT) scenario, a sender wants to send a message in a
private and reliable way to a receiver. Sender and receiver are connected by n wires, t of …

Gaining confidence on dependability benchmarks' conclusions through" back-to-back" testing (practical experience report)

M Martínez, D De Andrés… - 2014 Tenth European …, 2014 - ieeexplore.ieee.org
The main goal of any benchmark is to guide decisions through system ranking, but
surprisingly little research has been focused so far on providing means to gain confidence …

Asymptotically secure network code for active attacks

M Hayashi, N Cai - IEEE Transactions on Communications, 2021 - ieeexplore.ieee.org
When there exists a malicious attacker in the network, we need to be careful of
eavesdropping and contamination. This problem is crucial for network communication when …

Perfectly Secure Message Transmission Tolerating Omission Faults--Possibility Feasibility, and Optimality

R Kishore - Proceedings of the 26th International Conference on …, 2025 - dl.acm.org
In a given graph with two designated nodes, namely the S ender and the R eceiver, an
adversary can corrupt up to any t nodes (except for S and R) of its choice in an Omission …