An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

6G and the Post‐Shannon Theory

JA Cabrera, H Boche, C Deppe… - Shaping Future 6G …, 2021 - Wiley Online Library
Since the breakthrough of Shannon's seminal paper, researchers and engineers have
worked on codes and techniques that approach the fundamental limits of message …

Denial-of-service attacks on communication systems: Detectability and jammer knowledge

H Boche, RF Schaefer, HV Poor - IEEE Transactions on Signal …, 2020 - ieeexplore.ieee.org
Wireless communication systems are inherently vulnerable to intentional jamming. In this
paper, two classes of such jammers are considered: those with partial and full knowledge …

The arbitrarily varying wiretap channel—Secret randomness, stability, and super-activation

J Nötzel, M Wiese, H Boche - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
We define the common randomness-assisted capacity of an arbitrarily varying wiretap
channel (AVWC) when the eavesdropper is kept ignorant about the common randomness …

[图书][B] Identification and other probabilistic models

R Ahlswede, A Ahlswede - 2021 - Springer
After an introduction to classical information theory, we present now primarily own methods
and models, which go considerably beyond it. They were also sketched in our Shannon …

Secure identification under passive eavesdroppers and active jamming attacks

H Boche, C Deppe - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
In next-generation connectivity systems, which rely on robust and low-latency information
exchange, there exists communication tasks in which the Ahlswede/Dueck identification …

Covert communication in the presence of an uninformed, informed, and coordinated jammer

H ZivariFard, MR Bloch… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. This paper
investigates covert communication in the presence of a cooperative jammer. Covert …

Arbitrarily varying wiretap channels with type constrained states

Z Goldfeld, P Cuff, HH Permuter - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Determining a single-letter secrecy-capacity formula for the arbitrarily varying wiretap
channel (AVWTC) is an open problem largely because of two main challenges. Not only …

Sufficiently myopic adversaries are blind

BK Dey, S Jaggi, M Langberg - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We consider a communication problem in which a sender, Alice, wishes to communicate
with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is …

Semantic security via seeded modular coding schemes and Ramanujan graphs

M Wiese, H Boche - IEEE Transactions on Information Theory, 2020 - ieeexplore.ieee.org
A novel type of functions called biregular irreducible functions is introduced and applied as
security components (instead of, eg, universal hash functions) in seeded modular wiretap …