An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Entanglement-based quantum information technology: a tutorial
Entanglement is a quintessential quantum mechanical phenomenon with no classical
equivalent. First discussed by Einstein, Podolsky, and Rosen and formally introduced by …
equivalent. First discussed by Einstein, Podolsky, and Rosen and formally introduced by …
Covert communication in the presence of an uninformed jammer
Recent work has established that when transmitter Alice wishes to communicate reliably to
recipient Bob without detection by warden Willie, with additive white Gaussian noise …
recipient Bob without detection by warden Willie, with additive white Gaussian noise …
Covert communication over noisy channels: A resolvability perspective
MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We consider the situation in which a transmitter attempts to communicate reliably over a
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …
discrete memoryless channel, while simultaneously ensuring covertness (low probability of …
Demonstration of entanglement-enhanced covert sensing
The laws of quantum physics endow superior performance and security for information
processing: quantum sensing harnesses nonclassical resources to enable measurement …
processing: quantum sensing harnesses nonclassical resources to enable measurement …
Practical route to entanglement-assisted communication over noisy bosonic channels
Entanglement offers substantial advantages in quantum information processing, but loss
and noise hinder its application in practical scenarios. Although it has been well known for …
and noise hinder its application in practical scenarios. Although it has been well known for …
Covert communication gains from adversary's ignorance of transmission time
The recent square root law (SRL) for covert communication demonstrates that Alice can
reliably transmit O (√ n) bits to Bob in n uses of an additive white Gaussian noise (AWGN) …
reliably transmit O (√ n) bits to Bob in n uses of an additive white Gaussian noise (AWGN) …
Entanglement-assisted communication surpassing the ultimate classical capacity
Entanglement underpins a variety of quantum-enhanced communication, sensing, and
computing capabilities. Entanglement-assisted communication (EACOMM) leverages …
computing capabilities. Entanglement-assisted communication (EACOMM) leverages …
Optimal entanglement-assisted electromagnetic sensing and communication in the presence of noise
High time-bandwidth product signal and idler pulses comprised of independent identically
distributed two-mode squeezed vacuum (TMSV) states are readily produced by …
distributed two-mode squeezed vacuum (TMSV) states are readily produced by …
Multi-hop routing in covert wireless networks
In covert communication, Alice tries to communicate with Bob without being detected by a
warden Willie. When the distance between Alice and Bob becomes large compared with the …
warden Willie. When the distance between Alice and Bob becomes large compared with the …