Loading...
Search for: wire-tap-channels
0.011 seconds

    Non-asymptotic output statistics of Random Binning and its applications

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; July , 2013 , Pages 1849-1853 ; 21578095 (ISSN); 9781479904464 (ISBN) Yassaee, M. H ; Aref, M. R ; Gohari, A ; Sharif University of Technology
    2013
    Abstract
    In this paper we develop a finite blocklength version of the Output Statistics of Random Binning (OSRB) framework. This framework is shown to be optimal in the point-to-point case. New second order regions for broadcast channel and wiretap channel with strong secrecy criterion are derived  

    Joint source-channel coding for Multiple-Access Wiretap Channels

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; 2013 , Pages 369-373 ; 21578095 (ISSN); 9781479904464 (ISBN) Salehkalaibar, S ; Aref, M. R ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider lossy source transmission over a Multiple Access WireTap Channel (MAC-WT). In this model, there are two correlated sources, each of them is available at the corresponding encoder. The receiver tries to reconstruct both sources with desired distortions. The sources should be kept secret from an eavesdropper. We propose a joint source-channel scheme for the MAC-WT. In this scheme, each source sequence is mapped to common and private codewords. The common codeword can be decoded by the eavesdropper. The private codeword needs to be kept secret from the eavesdropper by using Wyner's wiretap coding. We also discuss some special cases of the proposed scheme  

    A correlation measure based on vector-valued Lp norms

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 1132-1136 ; 21578095 (ISSN); 9781538692912 (ISBN) Mojahedian, M. M ; Beigi, S ; Gohari, A ; Yassaee, M. H ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, a new measure of correlation is introduced. This measure depends on a parameter α, and is defined in terms of vector-valued Lp norms. The measure is within a constant of the exponential of α-Rényi mutual information, and reduces to the trace norm (total variation distance) for α = 1. We provide some properties and applications of this measure of correlation. In particular, we establish a bound on the secrecy exponent of the wiretap channel (under the total variation metric) in terms of the α-Rényi mutual information according to Csiszár's proposal. © 2019 IEEE  

    Key agreement over a state-dependent 3-receiver broadcast channel

    , Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) Bahrami, M ; Bereyhi, A ; Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider the problem of secret key agreement in state-dependent 3-receiver broadcast channels. In the proposed model, there are two legitimate receivers, an eavesdropper and a transmitter where the channel state information is non-causally available at the transmitter. We consider two setups. In the first setup, the transmitter tries to agree on a common key with the legitimate receivers while keeping it concealed from the eavesdropper. Simultaneously, the transmitter agrees on a private key with each of the legitimate receivers that needs to be kept secret from the other legitimate receiver and the eavesdropper. For this setup, we derive inner and outer bounds on the... 

    One-shot achievability via fidelity

    , Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 301-305 ; 21578095 (ISSN) ; 9781467377041 (ISBN) Yassaee, M. H ; Sharif University of Technology
    2015
    Abstract
    This paper provides a universal framework for establishing one-shot achievability results for coordination and secrecy problems. The framework is built on our previous framework [Yassaee et al. 13] for proving one-shot achievability results in the context of source and channel coding problems. In the coordination and secrecy problems, one needs to compare an induced distribution by encoding/decoding with an ideal distribution (satisfying some desirable properties) using a suitable criterion. In this paper, we use fidelity as a criterion for measuring the closeness of induced distribution with the ideal distribution. The framework exploits the stochastic mutual information coders at the... 

    Multiple access channel with common message and secrecy constraint

    , Article IET Communications ; Volume 10, Issue 1 , 2016 , Pages 98-110 ; 17518628 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    The authors study the problem of secret communication over a multiple-access channel with a common message. Here, the authors assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. The authors call this setting as multiple-access wiretap channel with common message (MAWC-CM). For this setting, the authors derive general inner and outer bounds on the secrecy capacity region for the discrete memoryless case and show that these bounds meet each other for a special case called the switch channel. As well, for a Gaussian version of... 

    Key agreement over a generalized multiple access channel using noiseless and noisy feedback

    , Article IEEE Journal on Selected Areas in Communications ; Volume 31, Issue 9 , 2013 , Pages 1765-1778 ; 07338716 (ISSN) Salimi, S ; Skoglund, M ; Golic, J. D ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    A secret key agreement framework involving three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. There is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 where the three users receive outputs from the channel. Furthermore, there is a feedback channel from user 3 to users 1 and 2 through which user 3 sends information extracted from the received output from the GDMMAC to increase the key rates. We consider both noiseless and noisy feedback. In the case of noiseless feedback, a public channel of unlimited capacity from user 3 to users... 

    Imperfect and Perfect Secrecy in Compound Multiple Access Channel with Confidential Message

    , Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the... 

    Sensitivity of the secrecy capacity of a wiretap channel to the channel gains with imperfect channel information

    , Article IWCIT 2017 - Iran Workshop on Communication and Information Theory, 3 May 2017 through 4 May 2017 ; 2017 ; 9781509047833 (ISBN) Sedighizad, M ; Bafghi, H. G ; Seyfe, B ; Sharif University of Technology
    Abstract
    In this paper, the impact of a small variations in the channel gains on the secrecy rate of the wiretap channel is studied, in which it is assumed that the imperfect channel knowledge is available at the transmitter. First, we consider general additive noise model for both legitimate and eavesdropper channels in the wiretap channel, and compute the variation of the secrecy rate resulting from the small variations in the channel gains. Then, we focus on the Gaussian wiretap channel, as a special case and calculate the sensitivity of the secrecy capacity to the channel gains with imperfect channel knowledge. Interestingly, it is shown that in some situations the effect of the channel variation...