Article
Computer Science, Information Systems
Jean de Dieu Mutangana, Ravi Tandon
Summary: This paper investigates the problem of topological interference management with confidential messages. It focuses on the symmetric secure degrees of freedom (SDoF) and presents necessary and sufficient conditions for positive symmetric SDoF. Two achievable schemes, secure partition and secure independent sets, are proposed. Outer bounds on symmetric SDoF for arbitrary network topologies are also provided. The optimal symmetric SDoF for K = 2-user and K = 3-user network topologies are characterized.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2022)
Article
Computer Science, Information Systems
Hua Sun
Summary: This article discusses secure communication between a transmitter and K receivers, where the transmitter wants to send a message to N receivers while keeping it secret from the remaining K - N receivers. The maximum message rate and minimum broadcast bandwidth are studied, and the results are characterized for various scenarios under combinatorial keys and symmetric settings.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2022)
Article
Computer Science, Information Systems
Yizhou Zhao, Hua Sun
Summary: In the robust secure aggregation problem, the server aims to securely recover the sum of the surviving users' inputs, even if some users drop out. We consider a minimal two-round model where the server obtains information from the surviving users to compute the desired sum.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2022)
Article
Computer Science, Information Systems
Lei Zhang
Summary: The paper proposes a key management scheme called DConBE for secure channel establishment in fog computing, allowing fog nodes to negotiate public encryption keys and decryption keys, achieving fog node dynamics, full collusion resistance, and statelessness.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2021)
Article
Engineering, Electrical & Electronic
Yi Luo, Hao-Kun Mao, Qiong Li, Nan Chen
Summary: This article discusses the importance of information-theoretic secure authentication in quantum key distribution systems. It proposes an ITS group authentication scheme for QKD networks that consumes fewer keys, and demonstrates the effectiveness of the scheme through simulation experiments.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Telecommunications
Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu
Summary: This paper proposes a method for extracting embedded messages under known cover images. The decoding path in the syndrome trellis is obtained using the stego sequence and a certain parity-check matrix, and the correct matrices can be determined by comparing the path consistency, allowing for correct message extraction.
DIGITAL COMMUNICATIONS AND NETWORKS
(2022)
Article
Physics, Multidisciplinary
Onur Gunlu, Rafael F. Schaefer, Holger Boche, Harold Vincent Poor
Summary: This paper extends the problem of secure source coding by considering a remote source whose measurements are correlated random variables. By adding various constraints, the exact rate regions are characterized and numerical computations are provided for specific cases.
Article
Mathematics, Applied
Georg Pichler, Pablo Piantanida, Gerald Matz
Summary: This paper investigates a novel multi-terminal source coding setup motivated by the biclustering problem. By improving cardinality bounds, the special case of a binary symmetric source and the gap between the inner and outer bounds in this case are thoroughly studied. Additionally, a multiple description extension of the CEO problem with mutual information constraint is investigated, which surprisingly allows for a tight single-letter characterization of the achievable region.
INFORMATION AND INFERENCE-A JOURNAL OF THE IMA
(2022)
Article
Computer Science, Information Systems
Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai, Ze Zhang
Summary: Cloud storage services have increased the demand for secure and efficient multiparty communications in un-trusted cloud environments. This paper proposes an information-theoretic secure rational secret sharing (RSS) scheme for heterogeneous intelligent devices in asynchronous networks, which encourages honest behavior among players and ensures secure communication.
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS
(2022)
Article
Telecommunications
Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen
Summary: In the telecare medicine information system (TMIS), privacy and security issues arise due to the need for patients to log in to multiple medical servers and the risk of data tampering. To address these concerns, a privacy-preserving scheme using blockchain technology and cryptography has been designed to protect patient privacy.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Shuping Dang, Shuaishuai Guo, Basem Shihada, Mohamed-Slim Alouini
Summary: This paper studies the modulation scheme based on OFDM-SNM and proves its performance advantages from an information-theoretic perspective. It analyzes the optimal pattern utilization probabilities and proposes an algorithm to approach the optimal values. Additionally, a Huffman coding based achievable PUP vector construction scheme is introduced, and numerical simulations are conducted to verify the effectiveness of the study.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2021)
Review
Physics, Multidisciplinary
Ali Tajer, Avi Steiner, Shlomo Shamai (Shitz)
Summary: This paper reviews the theoretical and practical principles of the broadcast approach to communication over state-dependent channels and networks, providing a strategy for designing transmission schemes that benefit from both short- and long-term performance guarantees.
Article
Mathematics, Applied
S. Nosratian, M. Moradkhani, M. B. Tavakoli
Summary: The research suggests that an efficient compression method combining fuzzy logic with Huffman coding can achieve a good compression rate and increase the compression ratio of images. By defining weighting functions for symbol frequency and generating efficient compression codes, the security and verification of information can be guaranteed while achieving a compression ratio of over 40% for the images.
IRANIAN JOURNAL OF FUZZY SYSTEMS
(2021)
Article
Quantum Science & Technology
Christoph Hirche, Cambyse Rouze, Daniel Stilck Franc
Summary: The paper focuses on the concept of contraction coefficients of quantum channels and its relation to the data processing inequality. It also discusses partial orders on quantum channels, approximate versions of the partial orders, and their relation to other partial orders in the literature. The framework of contraction coefficients is extended to general f-divergences, and new contraction coefficients and relations for Weyl-covariant and bosonic Gaussian channels are determined.
Article
Computer Science, Information Systems
Hongchao Zhou, Abbas El Gamal
Summary: The study extends from point-to-point communication to network communication, investigating the limits on information-theoretic secure communication with end-to-end encryption and establishing a tradeoff between the secure network rate and the secure channel rate. The research shows that information-theoretic secrecy can be achieved only if the sum rate of any subset of unhacked channels does not exceed the shared unhacked-secret-bit rate of these channels.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2021)
Article
Mathematics, Applied
Carlos Galindo, Fernando Hernando, Ryutaroh Matsumoto
FINITE FIELDS AND THEIR APPLICATIONS
(2018)
Article
Computer Science, Information Systems
Umberto Martinez-Penas, Ryutaroh Matsumoto
IEEE TRANSACTIONS ON INFORMATION THEORY
(2018)
Article
Optics
Mikio Fujiwara, Toshiyuki Ito, Mitsuo Kitamura, Hiroyuki Endo, Orie Tsuzuki, Morio Toyoshima, Hideki Takenaka, Yoshihisa Takayama, Ryosuke Shimizu, Masahiro Takeoka, Ryutaroh Matsumoto, Masahide Sasaki
Article
Computer Science, Hardware & Architecture
Ryutaroh Matsumoto
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
(2018)
Article
Quantum Science & Technology
Carlos Galindo, Fernando Hernando, Ryutaroh Matsumoto, Diego Ruano
QUANTUM INFORMATION PROCESSING
(2019)
Article
Quantum Science & Technology
Ryutaroh Matsumoto
QUANTUM INFORMATION PROCESSING
(2020)
Article
Computer Science, Theory & Methods
Ryutaroh Matsumoto
DESIGNS CODES AND CRYPTOGRAPHY
(2020)
Article
Computer Science, Hardware & Architecture
Ryutaroh Matsumoto, Manabu Hagiwara
Summary: This paper reviews the development of quantum error correction and suggests that it can be read independently through familiarity with conventional coding theory and tensor products in multi-linear algebra.
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
(2021)
Article
Computer Science, Hardware & Architecture
Ryutaroh Matsumoto, Manabu Hagiwara
Summary: Two systematic constructions of deletion-correcting codes were proposed: the first corrects only one deletion while the second corrects multiple deletions and constructs good codes. The second one also allows conversion to stabilizer-based quantum codes.
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
(2022)
Article
Mathematics, Applied
Carlos Galindo, Fernando Hernando, Ryutaroh Matsumoto
Summary: We propose a Steane-like enlargement procedure for entanglement-assisted quantum error-correcting codes by considering Euclidean inner product. We provide formulae for the parameters of these enlarged codes and demonstrate their application to explicitly compute the parameters of enlarged EAQECCs obtained from BCH codes.
COMPUTATIONAL & APPLIED MATHEMATICS
(2023)
Article
Computer Science, Information Systems
Rina Miyajima, Ryutaroh Matsumoto
Summary: This paper introduces classical secret sharing schemes and quantum secret sharing schemes, and proposes a quantum secret sharing scheme that allows for more flexible design of access structures and higher efficiency.
Article
Computer Science, Information Systems
Koichiro Yamanaka, Ryutaroh Matsumoto, Keita Takahashi, Toshiaki Fujii
Article
Engineering, Electrical & Electronic
Ryutaroh Matsumoto
IEICE COMMUNICATIONS EXPRESS
(2019)
Article
Engineering, Electrical & Electronic
Ryutaroh Matsumoto
IEICE COMMUNICATIONS EXPRESS
(2018)
Article
Computer Science, Information Systems
Carlos Galindo, Fernando Hernando, Ryutaroh Matsumoto, Diego Ruano