Broadcast channels with confidential messages

From MaRDI portal
Publication:4160829

DOI10.1109/TIT.1978.1055892zbMath0382.94017WikidataQ56389319 ScholiaQ56389319MaRDI QIDQ4160829

Imre Csiszár, János Körner

Publication date: 1978

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)




Related Items

On conclusive eavesdropping and measures of mutual information in quantum key distributionInformation-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratioWiretap channel in the presence of action-dependent states and noiseless feedbackSecurity of Device-Independent Quantum Key Distribution ProtocolsSimultaneous Secrecy and Reliability Amplification for a General Channel ModelBasics of Secrecy CodingNonentagled qutrits in two way deterministic QKDInformation theoretically secure key sharing protocol executing with constant noiseless public channelsPreservation of a lower bound of quantum secret key rate in the presence of decoherenceCan the use of the Leggett-Garg inequality enhance security of the BB84 protocol?A Probabilistic Error-Correcting Scheme that Provides Partial SecrecyNonorthogonal unitaries in two-way quantum key distributionWireless-channel key exchangeMeasurement-device-independent quantum key distribution with uncharacterized coherent sourcesBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationSome new results on the wiretap channel with side informationImproving classical authentication over a quantum channelSemi-quantum key distribution using qudit systems and security proofWhen Are Fuzzy Extractors Possible?Public and private resource trade-offs for a quantum channelOn the origin of nonclassicality in single systemsSecurity analysis of measurement-device-independent quantum secure direct communicationUnambiguous State Discrimination Attack on the B92 Protocol of Quantum Key Distribution with Single PhotonsComputational wiretap coding from indistinguishability obfuscationBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationPhysical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppersPosition-based coding and convex splitting for private communication over quantum channelsOn the security of the ping-pong protocolAsymmetric ``4+2 protocol for quantum key distribution with finite resourcesON STANDARDS AND SPECIFICATIONS IN QUANTUM CRYPTOGRAPHYLong term confidentiality: a surveyQuantum Cryptography: Key Distribution and BeyondConcise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengthsThe Wire-Tap ChannelQuantum key distribution using a two-way quantum channelUsing quantum key distribution for cryptographic purposes: a surveyChecking noise correlations for safer two-way quantum key distributionTwo-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement techniqueAn operational characterization of mutual information in algorithmic information theoryDC programming and DCA for enhancing physical layer security via relay beamforming strategiesHigh-dimensional quantum key distribution using polarization-phase encoding: security analysisInformation Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR AntennaAn Eavesdropping Game with SINR as an Objective FunctionQUANTUM ENTANGLEMENT AND SECRECYHow well can you know the edge of a quantum pyramid?Strong Secrecy for Multiple Access ChannelsOn Oblivious Transfer CapacityNearly optimal robust secret sharingUpper concave envelopes and auxiliary random variablesQuantum relays for long distance quantum cryptographyBELL'S INEQUALITIES DETECT EFFICIENT ENTANGLEMENTNo-signaling quantum key distribution: solution by linear programmingThe capacity of a quantum channel for simultaneous transmission of classical and quantum informationUnnamed ItemA joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakageInformation theories with adversaries, intrinsic information, and entanglementAttainable unconditional security for shared-key cryptosystemsPrecise evaluation of leaked information with secure randomness extraction in the presence of quantum attackerOPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTIONColloquium: The Einstein-Podolsky-Rosen paradox: From concepts to applicationsQuantum entanglementQuantum cloningWiretap channel with action-dependent channel state informationDC Programming and DCA for Enhancing Physical Layer Security in Amplify-and-Forward Relay Beamforming Networks Based on the SNR ApproachWIGNER TOMOGRAPHIC QKD IN DIMENSION STRICTLY LARGER THAN 2Time coding protocols for quantum key distributionSpherical-code key-distribution protocols for qubitsFrom Bell’s Theorem to Secure Quantum Key DistributionPhysical layer security in light-fidelity systemsOrthogonal-state-based cryptography in quantum mechanics and local post-quantum theoriesStrong Secrecy for Wireless Channels (Invited Talk)The structure of degradable quantum channelsRAW-DATA ATTACKS IN QUANTUM CRYPTOGRAPHY WITH PARTIAL TOMOGRAPHYALTERNATIVE DERIVATION OF THE CRITERION FOR ECONOMICAL REALIZATION OF ONE-TO-TWO QUBIT CLONINGQuantum privacy and quantum wiretap channelsMeasurement device-independent quantum secure direct communication with user authenticationCommon Information, Noise Stability, and Their ExtensionsTransmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoderToward secure communication using intra-particle entanglementIndividual attacks with generalized discrimination and inadequacy of some information measures




This page was built for publication: Broadcast channels with confidential messages