메뉴 건너뛰기




Volumn 60, Issue 10, 2014, Pages 6399-6416

Semantically secure lattice codes for the Gaussian wiretap channel

Author keywords

information theoretic security; Lattice coding; semantic security; strong secrecy; wiretap channel

Indexed keywords

INFORMATION- THEORETIC SECURITIES; LATTICE CODING; SEMANTIC SECURITY; STRONG SECRECIES; WIRE-TAP CHANNELS;

EID: 84907222991     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2014.2343226     Document Type: Article
Times cited : (147)

References (43)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 2
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár, "Almost independence and secrecy capacity," Problems Inf. Transmiss., vol. 32, no. 1, pp. 40-47, 1996.
    • (1996) Problems Inf. Transmiss. , vol.32 , Issue.1 , pp. 40-47
    • Csiszár, I.1
  • 3
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci., vol. 28, no. 2, pp. 270-299, 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 5
    • 80051775152 scopus 로고    scopus 로고
    • Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
    • Sep.
    • A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 585-594, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 585-594
    • Subramanian, A.1    Thangaraj, A.2    Bloch, M.3    McLaughlin, S.4
  • 6
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Oct.
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 9
    • 83655193063 scopus 로고    scopus 로고
    • On the eavesdropper's correct decision in Gaussian and fading wiretap channels using lattice codes
    • Oct.
    • A. Ernvall-Hytonen and C. Hollanti, "On the eavesdropper's correct decision in Gaussian and fading wiretap channels using lattice codes," in Proc. IEEE Inf. Theory Workshop (ITW), Oct. 2011, pp. 210-214.
    • (2011) Proc. IEEE Inf. Theory Workshop (ITW) , pp. 210-214
    • Ernvall-Hytonen, A.1    Hollanti, C.2
  • 11
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov.
    • L. Lai, H. El Gamal, and H. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.3
  • 12
    • 5144221013 scopus 로고    scopus 로고
    • Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding
    • Oct.
    • U. Erez and R. Zamir, "Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.10 , pp. 2293-2314
    • Erez, U.1    Zamir, R.2
  • 14
    • 79955504787 scopus 로고    scopus 로고
    • The Gaussian many-to-one interference channel with confidential messages
    • May
    • X. He and A. Yener, "The Gaussian many-to-one interference channel with confidential messages," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2730-2745, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 2730-2745
    • He, X.1    Yener, A.2
  • 15
    • 84871819283 scopus 로고    scopus 로고
    • Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay
    • Jan.
    • X. He and A. Yener, "Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay," IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, Jan. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.1 , pp. 177-192
    • He, X.1    Yener, A.2
  • 16
    • 84889587094 scopus 로고    scopus 로고
    • Strong secrecy from channel resolvability
    • Dec.
    • M. Bloch and J. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8077-8098
    • Bloch, M.1    Laneman, J.2
  • 17
    • 84900481009 scopus 로고    scopus 로고
    • Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels
    • L. Luzzi and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels," in Proc. 5th Int. ICST Conf. Perform. Eval. Methodol. Tools, 2011, pp. 641-647.
    • (2011) Proc. 5th Int. ICST Conf. Perform. Eval. Methodol. Tools , pp. 641-647
    • Luzzi, L.1    Bloch, M.R.2
  • 18
    • 84861398796 scopus 로고    scopus 로고
    • Secret key generation for correlated Gaussian sources
    • Jun.
    • S. Nitinawarat and P. Narayan, "Secret key generation for correlated Gaussian sources," IEEE Trans. Inf. Theory, vol. 58, no. 6, pp. 3373-3391, Jun. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.6 , pp. 3373-3391
    • Nitinawarat, S.1    Narayan, P.2
  • 19
    • 84890317698 scopus 로고    scopus 로고
    • Secret key generation from Gaussian sources using lattice hashing
    • Jul.
    • C. Ling, L. Luzzi, and M. Bloch, "Secret key generation from Gaussian sources using lattice hashing," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, pp. 2621-2625.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 2621-2625
    • Ling, C.1    Luzzi, L.2    Bloch, M.3
  • 20
    • 70350294927 scopus 로고    scopus 로고
    • Lattice-based cryptography
    • D. J. Bernstein and J. Buchmann, Eds. Berlin, Germany: Springer-Verlag
    • D. Micciancio and O. Regev, "Lattice-based cryptography," in Post- Quantum Cryprography, D. J. Bernstein and J. Buchmann, Eds. Berlin, Germany: Springer-Verlag, 2008.
    • (2008) Post- Quantum Cryprography
    • Micciancio, D.1    Regev, O.2
  • 25
    • 0028384933 scopus 로고
    • On coding without restrictions for the AWGN channel
    • Mar.
    • G. Poltyrev, "On coding without restrictions for the AWGN channel," IEEE Trans. Inf. Theory, vol. 40, no. 2, pp. 409-417, Mar. 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.2 , pp. 409-417
    • Poltyrev, G.1
  • 26
    • 0031276871 scopus 로고    scopus 로고
    • Averaging bounds for lattices and linear codes
    • Nov.
    • H. A. Loeliger, "Averaging bounds for lattices and linear codes," IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1767-1773, Nov. 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.6 , pp. 1767-1773
    • Loeliger, H.A.1
  • 27
    • 0000303291 scopus 로고
    • New bounds in some transference theorems in the geometry of numbers
    • W. Banaszczyk, "New bounds in some transference theorems in the geometry of numbers," Math. Ann., vol. 296, no. 1, pp. 625-635, 1993.
    • (1993) Math. Ann. , vol.296 , Issue.1 , pp. 625-635
    • Banaszczyk, W.1
  • 28
    • 0034188157 scopus 로고    scopus 로고
    • Sphere-bound-achieving coset codes and multilevel coset codes
    • May
    • G. Forney, M. Trott, and S.-Y. Chung, "Sphere-bound-achieving coset codes and multilevel coset codes," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 820-850, May 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.3 , pp. 820-850
    • Forney, G.1    Trott, M.2    Chung, S.-Y.3
  • 29
    • 17744363914 scopus 로고    scopus 로고
    • Worst-case to average-case reductions based on Gaussian measures
    • Rome, Italy, Oct
    • D. Micciancio and O. Regev, "Worst-case to average-case reductions based on Gaussian measures," in Proc. Ann. Symp. Found. Comput. Sci., Rome, Italy, Oct. 2004, pp. 372-381.
    • (2004) Proc. Ann. Symp. Found. Comput. Sci. , pp. 372-381
    • Micciancio, D.1    Regev, O.2
  • 30
    • 83655191144 scopus 로고    scopus 로고
    • Lattice codes for the compute-and-forward protocol: The flatness factor
    • Paraty, Brazil, Oct.
    • J.-C. Belfiore, "Lattice codes for the compute-and-forward protocol: The flatness factor," in Proc. IEEE ITW, Paraty, Brazil, Oct. 2011, pp. 1-4.
    • (2011) Proc. IEEE ITW , pp. 1-4
    • Belfiore, J.-C.1
  • 31
    • 84867488674 scopus 로고    scopus 로고
    • Lattice codes achieving strong secrecy over the mod Gaussian channel
    • Cambridge, MA, USA, Jul.
    • C. Ling, L. Luzzi, and J.-C. Belfiore, "Lattice codes achieving strong secrecy over the mod Gaussian channel," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Cambridge, MA, USA, Jul. 2012, pp. 2306-2310.
    • (2012) Proc. IEEE Int. Symp. Inform. Theory (ISIT) , pp. 2306-2310
    • Ling, C.1    Luzzi, L.2    Belfiore, J.-C.3
  • 32
  • 34
    • 70349309809 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," J. ACM, vol. 56, no. 6, pp. 34:1-34:40, 2009.
    • (2009) J. ACM , vol.56 , Issue.6 , pp. 3401-3440
    • Regev, O.1
  • 35
    • 5144231861 scopus 로고    scopus 로고
    • On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener
    • G. D. Forney, "On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener," in Proc. 41st Allerton Conf. Commun., Control Comput., 2003, pp. 430-439.
    • (2003) Proc. 41st Allerton Conf. Commun., Control Comput. , pp. 430-439
    • Forney, G.D.1
  • 36
    • 26844546304 scopus 로고    scopus 로고
    • Lattices which are good for (almost) everything
    • Oct.
    • U. Erez, S. Litsyn, and R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.10 , pp. 3401-3416
    • Erez, U.1    Litsyn, S.2    Zamir, R.3
  • 37
    • 0027602480 scopus 로고
    • Approximation theory of output statistics
    • May
    • T. Han and S. Verdu, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 752-772
    • Han, T.1    Verdu, S.2
  • 38
    • 0030191118 scopus 로고    scopus 로고
    • On lattice quantization noise
    • Jul.
    • R. Zamir and M. Feder, "On lattice quantization noise," IEEE Trans. Inf. Theory, vol. 42, no. 4, pp. 1152-1159, Jul. 1996.
    • (1996) IEEE Trans. Inf. Theory , vol.42 , Issue.4 , pp. 1152-1159
    • Zamir, R.1    Feder, M.2
  • 39
    • 84945713988 scopus 로고
    • Coset codes. I. Introduction and geometrical classification
    • Sep.
    • G. D. Forney, Jr., "Coset codes. I. Introduction and geometrical classification," IEEE Trans. Inf. Theory, vol. 34, no. 5, pp. 1123-1151, Sep. 1988.
    • (1988) IEEE Trans. Inf. Theory , vol.34 , Issue.5 , pp. 1123-1151
    • Forney, G.D.1
  • 40
    • 0033896372 scopus 로고    scopus 로고
    • Finding the closest lattice vector when it's unusually close
    • P. Klein, "Finding the closest lattice vector when it's unusually close," in Proc. ACM-SIAM Symp. Discrete Algorithms, 2000, pp. 937-941.
    • (2000) Proc. ACM-SIAM Symp. Discrete Algorithms , pp. 937-941
    • Klein, P.1
  • 41
    • 80052349133 scopus 로고    scopus 로고
    • Decoding by sampling: A randomized lattice algorithm for bounded-distance decoding
    • Sep.
    • S. Liu, C. Ling, and D. Stehlé, "Decoding by sampling: A randomized lattice algorithm for bounded-distance decoding," IEEE Trans. Inf. Theory, vol. 57, no. 9, pp. 5933-5945, Sep. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.9 , pp. 5933-5945
    • Liu, S.1    Ling, C.2    Stehlé, D.3
  • 43
    • 79960678507 scopus 로고    scopus 로고
    • Compute-and-forward: Harnessing interference through structured codes
    • Oct.
    • B. Nazer and M. Gastpar, "Compute-and-forward: Harnessing interference through structured codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6463-6486, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6463-6486
    • Nazer, B.1    Gastpar, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.