April 3, 2024, 4:10 a.m. | Esther H\"anggi, Iy\'an M\'endez Veiga, Ligong Wang

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.01760v1 Announce Type: new
Abstract: We consider the wiretap channel, where the individual channel uses have memory or are influenced by an adversary. We analyze the explicit and computationally efficient construction of information-theoretically secure coding schemes which use the inverse of an extractor and an error-correcting code. These schemes are known to achieve secrecy capacity on a large class of memoryless wiretap channels. We show that this also holds for certain channel types with memory. In particular, they can achieve …

adversarial adversary arxiv channel code coding construction cs.cr cs.it error explicit information math.it memory secrecy secure coding security wiretap

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)