International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a novel superposition coding scheme. Our inner bound improves upon the previously best known SM-SK trade-off result by Prabhakaran et al., and to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this se...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
International audienceThe state-dependent (SD) wiretap channel (WTC) with non-causal channel state i...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
We furnish a procedure based on universal hash families that can convert an error correcting code of...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Information embedding on actions is a new channel model in which a specific decoder is used to obser...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
International audienceThe state-dependent (SD) wiretap channel (WTC) with non-causal channel state i...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The ...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—We study secret-key agreement protocols over a wiretap channel controlled by a state parame...
We furnish a procedure based on universal hash families that can convert an error correcting code of...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
Information embedding on actions is a new channel model in which a specific decoder is used to obser...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...