Skip to main content

Showing 1–14 of 14 results for author: McLaughlin, S W

.
  1. Physical-Layer Security over Correlated Erasure Channels

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior work focused on cases in which the wiretap channel could be modeled as statistically independent p… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 5 pages, 4 figures, submitted to ISIT 2011

  2. Coding for Cryptographic Security Enhancement using Stop** Sets

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the diff… ▽ More

    Submitted 15 February, 2011; originally announced February 2011.

    Comments: 13 pages, 8 figures

  3. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes

    Authors: Arunkumar Subramanian, Andrew Thangaraj, Matthieu Bloch, Steven W. McLaughlin

    Abstract: For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using Ramanujan graphs. When the DDP has minimum left degree at least three, we show using density evolution analysis that the expected bit-error probability of these ensembles, when passed through a binary erasure channel wit… ▽ More

    Submitted 22 February, 2011; v1 submitted 16 September, 2010; originally announced September 2010.

    Comments: 11 pages, 4 figures. Submitted to the IEEE Transactions on Information Forensics and Security

  4. Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both… ▽ More

    Submitted 4 May, 2009; originally announced May 2009.

    Comments: 11 pages, 5 figures, accepted at 2009 IEEE International Symposium on Information Theory (ISIT 2009)

  5. arXiv:0902.3286  [pdf, ps, other

    cs.IT

    MDS codes on the erasure-erasure wiretap channel

    Authors: Arunkumar Subramanian, Steven W. McLaughlin

    Abstract: This paper considers the problem of perfectly secure communication on a modified version of Wyner's wiretap channel II where both the main and wiretapper's channels have some erasures. A secret message is to be encoded into $n$ channel symbols and transmitted. The main channel is such that the legitimate receiver receives the transmitted codeword with exactly $n - ν$ erasures, where the position… ▽ More

    Submitted 18 February, 2009; originally announced February 2009.

    Comments: Submitted to the 2009 IEEE International Symposium on Information Theory

  6. Physical-Layer Security: Combining Error Control Coding and Cryptography

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the channel is error free. However, in any real application the channels for friendly users and passive eavesdroppers are not error free and Wyner's wi… ▽ More

    Submitted 16 April, 2009; v1 submitted 2 January, 2009; originally announced January 2009.

    Comments: 12 pages, 5 figures. Submitted and accepted to the International Conference on Communications (ICC) 2009. v2: equivalent to the version that will be published in the conference proceedings. Has some altered notation from version 1 as well as slight changes in the wording to make the paper more readable and easier to understand

    ACM Class: H.1.1; K.6.5

  7. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    Authors: Jerome Lodewyck, Matthieu Bloch, Raul Garcia-Patron, Simon Fossier, Evgueni Karpov, Eleni Diamanti, Thierry Debuisschert, Nicolas J. Cerf, Rosa Tualle-Brouri, Steven W. McLaughlin, Philippe Grangier

    Abstract: We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implement… ▽ More

    Submitted 4 September, 2007; v1 submitted 28 June, 2007; originally announced June 2007.

    Comments: 11 pages, 5 figures, submitted to Phys. Rev. A

    Journal ref: Phys. Rev. A 76, 042305 (2007)

  8. The Design of Efficiently-Encodable Rate-Compatible LDPC Codes

    Authors: Jaehong Kim, Aditya Ramamoorthy, Steven W. McLaughlin

    Abstract: We present a new class of irregular low-density parity-check (LDPC) codes for moderate block lengths (up to a few thousand bits) that are well-suited for rate-compatible puncturing. The proposed codes show good performance under puncturing over a wide range of rates and are suitable for usage in incremental redundancy hybrid-automatic repeat request (ARQ) systems. In addition, these codes are li… ▽ More

    Submitted 3 May, 2007; originally announced May 2007.

    Comments: Accepted subject to minor revision to IEEE Trans. on Comm

  9. arXiv:cs/0611121  [pdf, ps, other

    cs.IT

    Wireless Information-Theoretic Security - Part II: Practical Implementation

    Authors: Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin

    Abstract: In Part I of this two-part paper on confidential communication over wireless channels, we studied the fundamental security limits of quasi-static fading channels from the point of view of outage secrecy capacity with perfect and imperfect channel state information. In Part II, we develop a practical secret key agreement protocol for Gaussian and quasi-static fading wiretap channels. The protocol… ▽ More

    Submitted 23 November, 2006; originally announced November 2006.

    Comments: 25 pages, 11 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security

  10. arXiv:cs/0611120  [pdf, ps, other

    cs.IT

    Wireless Information-Theoretic Security - Part I: Theoretical Aspects

    Authors: Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin

    Abstract: In this two-part paper, we consider the transmission of confidential data over wireless wiretap channels. The first part presents an information-theoretic problem formulation in which two legitimate partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through another independent quasi-static fading channel. We define the secrecy capacity in ter… ▽ More

    Submitted 22 November, 2006; originally announced November 2006.

    Comments: 27 pages, 14 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security

  11. arXiv:cs/0509041  [pdf, ps, other

    cs.IT

    Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes

    Authors: Matthieu Bloch, Andrew Thangaraj, Steven W. McLaughlin

    Abstract: This paper investigates an efficient and practical information reconciliation method in the case where two parties have access to correlated continuous random variables. We show that reconciliation is a special case of channel coding and that existing coded modulation techniques can be adapted for reconciliation. We describe an explicit reconciliation method based on LDPC codes in the case of co… ▽ More

    Submitted 14 September, 2005; originally announced September 2005.

    Comments: 9 pages, 9 figures

  12. arXiv:cs/0411012  [pdf, ps, other

    cs.IT

    Capacity Analysis for Continuous Alphabet Channels with Side Information, Part II: MIMO Channels

    Authors: Majid Fozunbal, Steven W. McLaughlin, Ronald W. Schafer

    Abstract: In this part, we consider the capacity analysis for wireless mobile systems with multiple antenna architectures. We apply the results of the first part to a commonly known baseband, discrete-time multiple antenna system where both the transmitter and receiver know the channel's statistical law. We analyze the capacity for additive white Gaussian noise (AWGN) channels, fading channels with full c… ▽ More

    Submitted 6 November, 2004; originally announced November 2004.

    Comments: Submitted to Trans. Inform. Theory

  13. Capacity Analysis for Continuous Alphabet Channels with Side Information, Part I: A General Framework

    Authors: Majid Fozunbal, Steven W. McLaughlin, Ronald W. Schafer

    Abstract: Capacity analysis for channels with side information at the receiver has been an active area of interest. This problem is well investigated for the case of finite alphabet channels. However, the results are not easily generalizable to the case of continuous alphabet channels due to analytic difficulties inherent with continuous alphabets. In the first part of this two-part paper, we address an a… ▽ More

    Submitted 6 November, 2004; originally announced November 2004.

    Comments: Submitted to IEEE Trans. Inform. Theory

  14. Capacity Achieving Code Constructions for Two Classes of (d,k) Constraints

    Authors: Yogesh Sankarasubramaniam, Steven W. McLaughlin

    Abstract: In this paper, we present two low complexity algorithms that achieve capacity for the noiseless (d,k) constrained channel when k=2d+1, or when k-d+1 is not prime. The first algorithm, called symbol sliding, is a generalized version of the bit flip** algorithm introduced by Aviran et al. [1]. In addition to achieving capacity for (d,2d+1) constraints, it comes close to capacity in other cases.… ▽ More

    Submitted 3 November, 2004; originally announced November 2004.

    Comments: 16 pages, submitted to the IEEE Transactions on Information Theory