scispace - formally typeset
Topic

Secure communication

About: Secure communication is a(n) research topic. Over the lifetime, 7701 publication(s) have been published within this topic receiving 109325 citation(s).

...read more

Papers
More filters

Journal ArticleDOI
TL;DR: A practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security and is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.

...read more

Abstract: This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.

...read more

1,676 citations


Book ChapterDOI
Ran Canetti1, Hugo Krawczyk2Institutions (2)
06 May 2001-
Abstract: We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys some important analytical benefits: (i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as defined here); and (ii) the definition allows for simple modular proofs of security: one can design and prove security of key-exchange protocols in an idealized model where the communication links are perfectly authenticated, and then translate them using general tools to obtain security in the realistic setting of adversary-controlled links. We exemplify the usability of our results by applying them to obtain the proof of two classes of key-exchange protocols, Diffie-Hellman and key-transport, authenticated via symmetric or asymmetric techniques.

...read more

1,386 citations


Journal ArticleDOI
Kim Joris Boström1, Timo Felbinger1Institutions (1)
TL;DR: A novel secure communication protocol is presented, based on an entangled pair of qubits and allowing asymptotically secure key distribution and quasisecure direct communication, which also makes commercial applications conceivable.

...read more

Abstract: A novel secure communication protocol is presented, based on an entangled pair of qubits and allowing asymptotically secure key distribution and quasisecure direct communication. Since the information is transferred in a deterministic manner, no qubits have to be discarded. The transmission of information is instantaneous, i.e., the information can be decoded during the transmission. The security against arbitrary eavesdropping attacks is provided. In case of eavesdropping attacks with full information gain, the detection rate is 50% per control transmission. The experimental realization of the protocol is feasible with relatively small effort, which also makes commercial applications conceivable.

...read more

958 citations


Proceedings ArticleDOI
Martín Abadi1, Cédric Fournet2Institutions (2)
01 Jan 2001-
TL;DR: A simple, general extension of the pi calculus with value passing, primitive functions, and equations among terms is introduced, and semantics and proof techniques for this extended language are developed and applied in reasoning about some security protocols.

...read more

Abstract: We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are the main motivating examples for our work; it also appears in other programming-language contexts. Specifically, we introduce a simple, general extension of the pi calculus with value passing, primitive functions, and equations among terms. We develop semantics and proof techniques for this extended language and apply them in reasoning about some security protocols.

...read more

953 citations


Proceedings ArticleDOI
18 Nov 1993-
TL;DR: By modulating data on the chaotic signal used to synchronize two nonlinear systems, this work has created a Low Probability of Intercept (LPI) communications system and derived the equations which govern the system.

...read more

Abstract: An innovative communication system has been developed. This system has the potential for improved secure communication for covert operations. By modulating data on the chaotic signal used to synchronize two nonlinear systems, we have created a Low Probability of Intercept (LPI) communications system. We derived the equations which govern the system. We made models of the system and performed numerical simulations to test these models. The theoretical and numerical studies of this system have been validated by experiment. A recent design improvement has led to a system that synchronizes at 0 db signal-to-noise ratio. This development holds the promise of a Low Probability of Detection (LPD) system.© (1993) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.

...read more

942 citations


Network Information
Related Topics (5)
Network packet

159.7K papers, 2.2M citations

90% related
Encryption

98.3K papers, 1.4M citations

90% related
Key distribution

7.7K papers, 198.4K citations

90% related
Key (cryptography)

60.1K papers, 659.3K citations

90% related
Security analysis

4.5K papers, 63.8K citations

89% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202212
2021514
2020623
2019684
2018577
2017522

Top Attributes

Show by:

Topic's top 5 most impactful authors

Derrick Wing Kwan Ng

25 papers, 1.3K citations

Rafael F. Schaefer

14 papers, 418 citations

Neeraj Kumar

13 papers, 397 citations

H. Vincent Poor

11 papers, 385 citations

Aylin Yener

11 papers, 446 citations