Sorry, you need to enable JavaScript to visit this website.

Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels

Error message

  • The specified file temporary://file2jIAu0 could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileHmJpEK could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileWmMrhq could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://filejYV3jE could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://filegCpaw2 could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileAxtbCd could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://filedM0qRA could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileNgSw3I could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
Citation Author(s):
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce
Submitted by:
Linda Senigagliesi
Last updated:
2 December 2016 - 5:45am
Document Type:
Presentation Slides
Document Year:
2016
Event:
Presenters:
Linda Senigagliesi
Paper Code:
1283
 

We propose a simple protocol which allows two legitimate parties to exchange some confidential message over a wireless
channel with some chosen level of semantic security against passive eavesdroppers, and without needing either secret or public keys. The proposed method leverages the noisy and fading nature of the channel and exploits coding and all-or-nothing transforms to achieve the desired level of semantic security. We also define suitable metrics to estimate the semantic security level in the considered setting.

up
0 users have voted: