We furnish a procedure based on universal hash families that can convert an error correcting code of rate R to a semantically secure wiretap code of rate R?? where ? is some parameter derived from the eavesdropper?s channel. This conversion is shown to be polynomial time e?cient with block length and is applicable to any discrete time channel. To prove the induced wiretap code is semantically secure, we have upgraded recent leakage bounds by maximizing over all message distributions. The semantic leakage is shown to be exponentially decreasing with block length. As an explicit application, we construct a concrete, polynomial time e?cient, semantically secure wiretap code that can achieve the secrecy capacity of the AWGN wiretap channel. Mor...
In industrial machine type communications, an increasing number of wireless devices communicate unde...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
We study application of convolutional codes to the randomized encoding scheme introduced by Wyner as...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceWith the advent of quantum key distribution (QKD) systems, perfect (i.e. infor...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
Abstract—We extend the Bellare-Tessaro coding scheme for a discrete, degraded, symmetric wiretap cha...
We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require...
International audienceWe propose a new scheme of wiretap lattice coding that achieves semantic secur...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
In this paper we propose an encoding-encryption approach to take advantage of intentional noise intr...
We provide a set of semantically secure achievable rates for the fast fading wiretap channel. In par...
In industrial machine type communications, an increasing number of wireless devices communicate unde...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
We study application of convolutional codes to the randomized encoding scheme introduced by Wyner as...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceWith the advent of quantum key distribution (QKD) systems, perfect (i.e. infor...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
Abstract—We extend the Bellare-Tessaro coding scheme for a discrete, degraded, symmetric wiretap cha...
We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require...
International audienceWe propose a new scheme of wiretap lattice coding that achieves semantic secur...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
In this paper we propose an encoding-encryption approach to take advantage of intentional noise intr...
We provide a set of semantically secure achievable rates for the fast fading wiretap channel. In par...
In industrial machine type communications, an increasing number of wireless devices communicate unde...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
We study application of convolutional codes to the randomized encoding scheme introduced by Wyner as...