Broadcast channels with confidential messages
From MaRDI portal
Publication:4160829
DOI10.1109/TIT.1978.1055892zbMath0382.94017WikidataQ56389319 ScholiaQ56389319MaRDI QIDQ4160829
Publication date: 1978
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Related Items
On conclusive eavesdropping and measures of mutual information in quantum key distribution ⋮ Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio ⋮ Wiretap channel in the presence of action-dependent states and noiseless feedback ⋮ Security of Device-Independent Quantum Key Distribution Protocols ⋮ Simultaneous Secrecy and Reliability Amplification for a General Channel Model ⋮ Basics of Secrecy Coding ⋮ Nonentagled qutrits in two way deterministic QKD ⋮ Information theoretically secure key sharing protocol executing with constant noiseless public channels ⋮ Preservation of a lower bound of quantum secret key rate in the presence of decoherence ⋮ Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol? ⋮ A Probabilistic Error-Correcting Scheme that Provides Partial Secrecy ⋮ Nonorthogonal unitaries in two-way quantum key distribution ⋮ Wireless-channel key exchange ⋮ Measurement-device-independent quantum key distribution with uncharacterized coherent sources ⋮ Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation ⋮ Some new results on the wiretap channel with side information ⋮ Improving classical authentication over a quantum channel ⋮ Semi-quantum key distribution using qudit systems and security proof ⋮ When Are Fuzzy Extractors Possible? ⋮ Public and private resource trade-offs for a quantum channel ⋮ On the origin of nonclassicality in single systems ⋮ Security analysis of measurement-device-independent quantum secure direct communication ⋮ Unambiguous State Discrimination Attack on the B92 Protocol of Quantum Key Distribution with Single Photons ⋮ Computational wiretap coding from indistinguishability obfuscation ⋮ Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation ⋮ Physical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppers ⋮ Position-based coding and convex splitting for private communication over quantum channels ⋮ On the security of the ping-pong protocol ⋮ Asymmetric ``4+2 protocol for quantum key distribution with finite resources ⋮ ON STANDARDS AND SPECIFICATIONS IN QUANTUM CRYPTOGRAPHY ⋮ Long term confidentiality: a survey ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths ⋮ The Wire-Tap Channel ⋮ Quantum key distribution using a two-way quantum channel ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ Checking noise correlations for safer two-way quantum key distribution ⋮ Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique ⋮ An operational characterization of mutual information in algorithmic information theory ⋮ DC programming and DCA for enhancing physical layer security via relay beamforming strategies ⋮ High-dimensional quantum key distribution using polarization-phase encoding: security analysis ⋮ Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna ⋮ An Eavesdropping Game with SINR as an Objective Function ⋮ QUANTUM ENTANGLEMENT AND SECRECY ⋮ How well can you know the edge of a quantum pyramid? ⋮ Strong Secrecy for Multiple Access Channels ⋮ On Oblivious Transfer Capacity ⋮ Nearly optimal robust secret sharing ⋮ Upper concave envelopes and auxiliary random variables ⋮ Quantum relays for long distance quantum cryptography ⋮ BELL'S INEQUALITIES DETECT EFFICIENT ENTANGLEMENT ⋮ No-signaling quantum key distribution: solution by linear programming ⋮ The capacity of a quantum channel for simultaneous transmission of classical and quantum information ⋮ Unnamed Item ⋮ A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage ⋮ Information theories with adversaries, intrinsic information, and entanglement ⋮ Attainable unconditional security for shared-key cryptosystems ⋮ Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker ⋮ OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION ⋮ Colloquium: The Einstein-Podolsky-Rosen paradox: From concepts to applications ⋮ Quantum entanglement ⋮ Quantum cloning ⋮ Wiretap channel with action-dependent channel state information ⋮ DC Programming and DCA for Enhancing Physical Layer Security in Amplify-and-Forward Relay Beamforming Networks Based on the SNR Approach ⋮ WIGNER TOMOGRAPHIC QKD IN DIMENSION STRICTLY LARGER THAN 2 ⋮ Time coding protocols for quantum key distribution ⋮ Spherical-code key-distribution protocols for qubits ⋮ From Bell’s Theorem to Secure Quantum Key Distribution ⋮ Physical layer security in light-fidelity systems ⋮ Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories ⋮ Strong Secrecy for Wireless Channels (Invited Talk) ⋮ The structure of degradable quantum channels ⋮ RAW-DATA ATTACKS IN QUANTUM CRYPTOGRAPHY WITH PARTIAL TOMOGRAPHY ⋮ ALTERNATIVE DERIVATION OF THE CRITERION FOR ECONOMICAL REALIZATION OF ONE-TO-TWO QUBIT CLONING ⋮ Quantum privacy and quantum wiretap channels ⋮ Measurement device-independent quantum secure direct communication with user authentication ⋮ Common Information, Noise Stability, and Their Extensions ⋮ Transmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoder ⋮ Toward secure communication using intra-particle entanglement ⋮ Individual attacks with generalized discrimination and inadequacy of some information measures
This page was built for publication: Broadcast channels with confidential messages