Sorry, you need to enable JavaScript to visit this website.

Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels

Citation Author(s):
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce
Submitted by:
Linda Senigagliesi
Last updated:
2 December 2016 - 5:45am
Document Type:
Presentation Slides
Document Year:
2016
Event:
Presenters:
Linda Senigagliesi
Paper Code:
1283
 

We propose a simple protocol which allows two legitimate parties to exchange some confidential message over a wireless
channel with some chosen level of semantic security against passive eavesdroppers, and without needing either secret or public keys. The proposed method leverages the noisy and fading nature of the channel and exploits coding and all-or-nothing transforms to achieve the desired level of semantic security. We also define suitable metrics to estimate the semantic security level in the considered setting.

up
0 users have voted: