International audienceIt is well-known that feedback does not increase the capacity of point-to-point memoryless channels, however, its effect in secure communications is not fully understood yet. In this work, an achievable scheme for the wiretap channel with generalized feedback -based on joint source-channel coding- is presented. This scheme recovers previous results, thus it can be seen as a generalization and unification of several results in the field. Additionally, the Gaussian wiretap channel with noisy feedback is analyzed, and the scheme achieves positive secrecy rates even in unfavorable situations where the eavesdropper experiences a much better channel than the legitimate user
Abstract—In this paper, we consider the secrecy capacity of a wiretap channel in the presence of cau...
Secure communication with feedback is studied. An achievability scheme in which the backward channel...
In this paper, we propose a feedback scheme for transmitting secret messages between two legitimate ...
International audienceIt is well-known that feedback does not increase the capacity of point-to-poin...
Submitted to IEEE Trans. Information TheoryInternational audienceIt is a well-known fact that feedba...
International audienceIt is well-known that feedback does not increase the capacity of point-to-poin...
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap c...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—Most practical communication links are bidirectional. In these models, since the source nod...
In this paper, the general wiretap channel with channel state information (CSI) at the transmitter a...
In this paper, we propose a feedback scheme to achieve a strictly positive secrecy rate over an eave...
permits unrestricted use, distribution, and reproduction in any medium, provided the original work i...
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which i...
Feedback links from the receivers to the transmitters are natural resources in many real-world commu...
Abstract—In this paper, we consider the secrecy capacity of a wiretap channel in the presence of cau...
Secure communication with feedback is studied. An achievability scheme in which the backward channel...
In this paper, we propose a feedback scheme for transmitting secret messages between two legitimate ...
International audienceIt is well-known that feedback does not increase the capacity of point-to-poin...
Submitted to IEEE Trans. Information TheoryInternational audienceIt is a well-known fact that feedba...
International audienceIt is well-known that feedback does not increase the capacity of point-to-poin...
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap c...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—Most practical communication links are bidirectional. In these models, since the source nod...
In this paper, the general wiretap channel with channel state information (CSI) at the transmitter a...
In this paper, we propose a feedback scheme to achieve a strictly positive secrecy rate over an eave...
permits unrestricted use, distribution, and reproduction in any medium, provided the original work i...
The Gaussian wiretap channel with noncausal state interference available at the transmitter, which i...
Feedback links from the receivers to the transmitters are natural resources in many real-world commu...
Abstract—In this paper, we consider the secrecy capacity of a wiretap channel in the presence of cau...
Secure communication with feedback is studied. An achievability scheme in which the backward channel...
In this paper, we propose a feedback scheme for transmitting secret messages between two legitimate ...