We investigate the problem of information theoretically secure communication in a line network with erasure channels and state feedback. We consider a spectrum of cases for the private randomness that intermediate nodes can generate, ranging from having intermediate nodes generate unlimited private randomness, to having intermediate nodes generate no private randomness, and all cases in between. We characterize the secret message capacity when either only one of the channels is eavesdropped or all of the channels are eavesdropped, and we develop polynomial time algorithms that achieve these capacities. We also give an outer bound for the case where an arbitrary number of channels is eavesdropped. Our work is the first to characterize the se...
We consider a group of m + 1 trusted nodes that aim to create a shared secret key K over a network i...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
Abstract—We study the secret message capacity of an ergodic block fading wiretap channel with partia...
Secure network coding assumes that the under-lying network links are lossless, thus it can be applie...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Consider a communication network represented by a directed graph G = (V, E), where V is the...
Secure network coding assumes that the underlying network channels are error-free; thus, if our chan...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
This paper considers a network comprising a transmitter, which employs random linear network coding ...
We consider a group of m + 1 trusted nodes that aim to create a shared secret key K over a network i...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
We consider a 1-to-K communication scenario, where a source transmits private messages to K receiver...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
Abstract—We study the secret message capacity of an ergodic block fading wiretap channel with partia...
Secure network coding assumes that the under-lying network links are lossless, thus it can be applie...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
Abstract—Consider a communication network represented by a directed graph G = (V, E), where V is the...
Secure network coding assumes that the underlying network channels are error-free; thus, if our chan...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
This paper considers a network comprising a transmitter, which employs random linear network coding ...
We consider a group of m + 1 trusted nodes that aim to create a shared secret key K over a network i...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...