Skip to main content

Showing 1–3 of 3 results for author: Ly, H D

Searching in archive cs. Search in all archives.
.
  1. Secure Symmetrical Multilevel Diversity Coding

    Authors: Anantharaman Balasubramanian, Hung D. Ly, Shuo Li, Tie Liu, Scott L. Miller

    Abstract: Symmetrical Multilevel Diversity Coding (SMDC) is a network compression problem introduced by Roche (1992) and Yeung (1995). In this setting, a simple separate coding strategy known as superposition coding was shown to be optimal in terms of achieving the minimum sum rate (Roche, Yeung, and Hau, 1997) and the entire admissible rate region (Yeung and Zhang, 1999) of the problem. This paper consider… ▽ More

    Submitted 9 January, 2012; originally announced January 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory in May 2011. Minor revision made to the current version in January 2012

  2. arXiv:1102.1475  [pdf, ps, other

    cs.IT

    Security Embedding Codes

    Authors: Hung D. Ly, Tie Liu, Yufei Blankenship

    Abstract: This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is show… ▽ More

    Submitted 7 February, 2011; originally announced February 2011.

    Comments: Submitted to the IEEE Transactions on Information Forensics and Security

  3. Multiple-Input Multiple-Output Gaussian Broadcast Channels with Common and Confidential Messages

    Authors: Hung D. Ly, Tie Liu, Yingbin Liang

    Abstract: This paper considers the problem of the multiple-input multiple-output (MIMO) Gaussian broadcast channel with two receivers (receivers 1 and 2) and two messages: a common message intended for both receivers and a confidential message intended only for receiver 1 but needing to be kept asymptotically perfectly secure from receiver 2. A matrix characterization of the secrecy capacity region is est… ▽ More

    Submitted 15 July, 2009; originally announced July 2009.

    Comments: Submitted to the IEEE Transactions on Information Theory, July 2009