Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common message to legitimate receivers 1 and 2 while keeping it secret from the receiver 3 (eavesdropper). The transmitter takes cost constrained actions to probe the transmitter-to-receiver 1 and transmitter-to-receiver 2 channels. Under the probing cost constraint, we provide a lower bound to the secrecy capacity of this setting. The achievability strategy employs a block Markov coding strategy in which the channel state sequence of the previous block is mapped to a key which secures the part of the confidential message to be transmitted in the current block. The challenge in using the state sequence as a source of the key is the fact that the le...
This paper considers a state dependent broadcast channel with one transmitter, Alice, and two receiv...
We consider a block fading wiretap channel, where a transmitter attempts to send messages securely t...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Abstract—In this paper, we consider the problem of secret key agreement in state-dependent 3-receive...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—This paper establishes inner bounds on the secrecy capacity regions for the general three-r...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
International audienceWe study the two-transmitter two-receiver channel with confidential messages c...
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
We study the security of communication between a single transmitter and many receivers in the prese...
This paper considers a state dependent broadcast channel with one transmitter, Alice, and two receiv...
We consider a block fading wiretap channel, where a transmitter attempts to send messages securely t...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...
Abstract—In this paper, we consider the problem of secret key agreement in state-dependent 3-receive...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—This paper establishes inner bounds on the secrecy capacity regions for the general three-r...
Abstract—The problem of secure broadcasting with indepen-dent secret keys is studied. The particular...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
International audienceWe study the two-transmitter two-receiver channel with confidential messages c...
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
We study the security of communication between a single transmitter and many receivers in the prese...
This paper considers a state dependent broadcast channel with one transmitter, Alice, and two receiv...
We consider a block fading wiretap channel, where a transmitter attempts to send messages securely t...
Alice and Bob want to share a secret key and to communicate an independent message, both of which th...