Semantic-security capacity for wiretap channels of type II
暂无分享,去创建一个
[1] Paul W. Cuff,et al. Soft covering with high probability , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[2] Himanshu Tyagi,et al. Semantically-Secure Coding Scheme Achieving the Capacity of a Gaussian Wiretap Channel , 2014, ArXiv.
[3] A. Robert Calderbank,et al. Wiretap channel type II with an active eavesdropper , 2009, 2009 IEEE International Symposium on Information Theory.
[4] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[5] Matthieu R. Bloch,et al. Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.
[6] Masahito Hayashi,et al. General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel , 2006, IEEE Transactions on Information Theory.
[7] Thomas M. Cover,et al. Network Information Theory , 2001 .
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Mihir Bellare,et al. Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity , 2012, IACR Cryptol. ePrint Arch..
[10] Kefei Chen,et al. Some new characters on the wire-tap channel of type II , 2005, IEEE Transactions on Information Theory.
[11] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[12] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[13] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[14] Mark M. Wilde,et al. Quantum Information Theory , 2013 .
[15] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[16] Aylin Yener,et al. Wiretap channel II with a noisy main channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[17] Sergio Verdú,et al. Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.
[18] Paul W. Cuff,et al. Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.
[19] Alexander Vardy,et al. A Cryptographic Treatment of the Wiretap Channel , 2012, IACR Cryptol. ePrint Arch..
[20] Rudolf Ahlswede,et al. Strong converse for identification via quantum channels , 2000, IEEE Trans. Inf. Theory.
[21] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[22] Paul W. Cuff,et al. The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List , 2014, IEEE Transactions on Information Theory.
[23] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[24] M. Wilde. Quantum Information Theory: Noisy Quantum Shannon Theory , 2013 .
[25] Aaron D. Wyner,et al. The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.
[26] Gerhard Kramer,et al. Informational divergence approximations to product distributions , 2013, 2013 13th Canadian Workshop on Information Theory.
[27] H. Vincent Poor,et al. A rate-distortion based secrecy system with side information at the decoders , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[28] H. Vincent Poor,et al. The likelihood encoder for lossy source compression , 2014, 2014 IEEE International Symposium on Information Theory.
[29] Masahito Hayashi,et al. Secure multiplex coding with dependent and non-uniform multiple messages , 2012, Allerton Conference.
[30] H. Vincent Poor,et al. Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.
[31] Andreas J. Winter,et al. Secret, public and quantum correlation cost of triples of random variables , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[32] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[33] Masahito Hayashi,et al. Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification , 2009, IEEE Transactions on Information Theory.
[34] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[35] Paul W. Cuff,et al. Rate-distortion theory for secrecy systems , 2013, 2013 IEEE International Symposium on Information Theory.
[36] Miodrag J. Mihaljevic. On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II , 1993, Error Control, Cryptology, and Speech Compression.
[37] R. Schumann. Quantum Information Theory , 2000, quant-ph/0010060.
[38] H. Vincent Poor,et al. The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.
[39] I. G. Núñez,et al. Generalized Hamming Weights for Linear Codes , 2001 .