317,137 research outputs found

    Securing a Quantum Key Distribution Network Using Secret Sharing

    Full text link
    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key

    The Dispersion of Nearest-Neighbor Decoding for Additive Non-Gaussian Channels

    Get PDF
    We study the second-order asymptotics of information transmission using random Gaussian codebooks and nearest neighbor (NN) decoding over a power-limited stationary memoryless additive non-Gaussian noise channel. We show that the dispersion term depends on the non-Gaussian noise only through its second and fourth moments, thus complementing the capacity result (Lapidoth, 1996), which depends only on the second moment. Furthermore, we characterize the second-order asymptotics of point-to-point codes over KK-sender interference networks with non-Gaussian additive noise. Specifically, we assume that each user's codebook is Gaussian and that NN decoding is employed, i.e., that interference from the K1K-1 unintended users (Gaussian interfering signals) is treated as noise at each decoder. We show that while the first-order term in the asymptotic expansion of the maximum number of messages depends on the power of the interferring codewords only through their sum, this does not hold for the second-order term.Comment: 12 pages, 3 figures, IEEE Transactions on Information Theor

    Optimal Save-Then-Transmit Protocol for Energy Harvesting Wireless Transmitters

    Full text link
    In this paper, the design of a wireless communication device relying exclusively on energy harvesting is considered. Due to the inability of rechargeable energy sources to charge and discharge at the same time, a constraint we term the energy half-duplex constraint, two rechargeable energy storage devices (ESDs) are assumed so that at any given time, there is always one ESD being recharged. The energy harvesting rate is assumed to be a random variable that is constant over the time interval of interest. A save-then-transmit (ST) protocol is introduced, in which a fraction of time {\rho} (dubbed the save-ratio) is devoted exclusively to energy harvesting, with the remaining fraction 1 - {\rho} used for data transmission. The ratio of the energy obtainable from an ESD to the energy harvested is termed the energy storage efficiency, {\eta}. We address the practical case of the secondary ESD being a battery with {\eta} < 1, and the main ESD being a super-capacitor with {\eta} = 1. The optimal save-ratio that minimizes outage probability is derived, from which some useful design guidelines are drawn. In addition, we compare the outage performance of random power supply to that of constant power supply over the Rayleigh fading channel. The diversity order with random power is shown to be the same as that of constant power, but the performance gap can be large. Furthermore, we extend the proposed ST protocol to wireless networks with multiple transmitters. It is shown that the system-level outage performance is critically dependent on the relationship between the number of transmitters and the optimal save-ratio for single-channel outage minimization. Numerical results are provided to validate our proposed study.Comment: This is the longer version of a paper to appear in IEEE Transactions on Wireless Communication
    corecore