Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular scenario is analyzed where a common message has to be broadcasted to two legitimate receivers, while keeping an external eavesdropper ignorant of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers, which can be used in different ways: They can be used as one-time pads to encrypt the common message or they can be used as randomization resources for wiretap coding. Both approaches are studied in this paper. If both legitimate channels are degraded versions of the eavesdropper channel, it is shown that the one-time pad approach is optimal for several cases yielding corresponding capacity express...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—In this paper, we consider the problem of secret key agreement in state-dependent 3-receive...
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
In this paper, we discuss methods by which a trusted authority can broadcast a message over a networ...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
Abstract—We consider the problem of secure communications over the two-way wiretap channel under a s...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—In this paper, we consider the problem of secret key agreement in state-dependent 3-receive...
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
In this paper, we discuss methods by which a trusted authority can broadcast a message over a networ...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
We consider true broadcast systems for the secure communication of session keys. These schemes provi...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
International audienceThis paper investigates the problem of secret key generation over a wiretap ch...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers an...
Abstract—We consider the problem of secure communications over the two-way wiretap channel under a s...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—In this paper, we consider the problem of secret key agreement in state-dependent 3-receive...
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...