An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Entanglement-based quantum information technology: a tutorial

Z Zhang, C You, OS Magaña-Loaiza… - Advances in Optics …, 2024 - opg.optica.org
Entanglement is a quintessential quantum mechanical phenomenon with no classical
equivalent. First discussed by Einstein, Podolsky, and Rosen and formally introduced by …

Covert communication in the presence of an uninformed jammer

TV Sobers, BA Bash, S Guha… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Recent work has established that when transmitter Alice wishes to communicate reliably to
recipient Bob without detection by warden Willie, with additive white Gaussian noise …

Covert communication over noisy channels: A resolvability perspective

MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We consider the situation in which a transmitter attempts to communicate reliably over a
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …

Demonstration of entanglement-enhanced covert sensing

S Hao, H Shi, CN Gagatsos, M Mishra, B Bash… - Physical Review Letters, 2022 - APS
The laws of quantum physics endow superior performance and security for information
processing: quantum sensing harnesses nonclassical resources to enable measurement …

Practical route to entanglement-assisted communication over noisy bosonic channels

H Shi, Z Zhang, Q Zhuang - Physical Review Applied, 2020 - APS
Entanglement offers substantial advantages in quantum information processing, but loss
and noise hinder its application in practical scenarios. Although it has been well known for …

Covert communication gains from adversary's ignorance of transmission time

BA Bash, D Goeckel, D Towsley - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The recent square root law (SRL) for covert communication demonstrates that Alice can
reliably transmit O (√ n) bits to Bob in n uses of an additive white Gaussian noise (AWGN) …

Entanglement-assisted communication surpassing the ultimate classical capacity

S Hao, H Shi, W Li, JH Shapiro, Q Zhuang, Z Zhang - Physical Review Letters, 2021 - APS
Entanglement underpins a variety of quantum-enhanced communication, sensing, and
computing capabilities. Entanglement-assisted communication (EACOMM) leverages …

Optimal entanglement-assisted electromagnetic sensing and communication in the presence of noise

H Shi, B Zhang, JH Shapiro, Z Zhang, Q Zhuang - Physical Review Applied, 2024 - APS
High time-bandwidth product signal and idler pulses comprised of independent identically
distributed two-mode squeezed vacuum (TMSV) states are readily produced by …

Multi-hop routing in covert wireless networks

A Sheikholeslami, M Ghaderi, D Towsley… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In covert communication, Alice tries to communicate with Bob without being detected by a
warden Willie. When the distance between Alice and Bob becomes large compared with the …