3,510 research outputs found
Secure and linear cryptosystems using error-correcting codes
A public-key cryptosystem, digital signature and authentication procedures
based on a Gallager-type parity-check error-correcting code are presented. The
complexity of the encryption and the decryption processes scale linearly with
the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted
by Bob, whereas a private-noise added by Alice to a given fraction of the
ciphertext of each encrypted plaintext serves to increase the secure channel
and is the cornerstone for digital signatures and authentication. Various
scenarios are discussed including the possible actions of the opponent Oscar as
an eavesdropper or as a disruptor
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing
the data flow through these networks is increasing. These sensor networks allow
for easy-to-apply and flexible installations which have enabled them to be used
for numerous applications. Due to these properties, they face distinct
information security threats. Security of the data flowing through across
networks provides the researchers with an interesting and intriguing potential
for research. Design of these networks to ensure the protection of data faces
the constraints of limited power and processing resources. We provide the
basics of wireless sensor network security to help the researchers and
engineers in better understanding of this applications field. In this chapter,
we will provide the basics of information security with special emphasis on
WSNs. The chapter will also give an overview of the information security
requirements in these networks. Threats to the security of data in WSNs and
some of their counter measures are also presented
Recursive Code Construction for Random Networks
A modification of Koetter-Kschischang codes for random networks is presented
(these codes were also studied by Wang et al. in the context of authentication
problems). The new codes have higher information rate, while maintaining the
same error-correcting capabilities. An efficient error-correcting algorithm is
proposed for these codes.Comment: Submitted to IEEE Transactions on Information Theor
Confidential direct communications: a quantum approach using continuous variables
We consider the problem of privacy in direct communications, showing how
quantum mechanics can be useful to guarantee a certain level of
confidentiality. In particular, we review a continuous variable approach
recently proposed by us [S. Pirandola et al., Europhys. Lett. 84, 20013
(2008)]. Here, we analyze the degree of privacy of this technique against a
broader class of attacks, which includes non-Gaussian eavesdropping.Comment: Invited paper. Extension of results presented in arXiv:0802.0656
(REVTeX, 11 pages, 11 figures
- …