2019
DOI: 10.1587/transcom.2018ebp3284
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Transmission for Secure Wireless Links Based on a Secret-Sharing Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 15 publications
0
0
0
Order By: Relevance
“…Consequently, the (𝑘, 𝑛)-threshold scheme can be easily transformed into an all-or-nothing scheme by selecting 𝑘 code symbols for transmission. We assume that an all-or-nothing scheme is applied at the transmitter to divide the transmitted information for distributed transmission [7].…”
Section: Secret-sharing Methods (Ssm)mentioning
confidence: 99%
See 2 more Smart Citations
“…Consequently, the (𝑘, 𝑛)-threshold scheme can be easily transformed into an all-or-nothing scheme by selecting 𝑘 code symbols for transmission. We assume that an all-or-nothing scheme is applied at the transmitter to divide the transmitted information for distributed transmission [7].…”
Section: Secret-sharing Methods (Ssm)mentioning
confidence: 99%
“…The main concept of this method is to pre-divide the transmitted information into several pieces and send each piece separately through different routes to the destination. Previous research [7] has shown that combining directive transmission with a secret-sharing method (SSM) [2] effectively exploits the multi-path property of wireless link to establish a secure connection based on this concept. In this method, at the transmitter, multiple routes to the destination are provided by adjusting the antenna's directivity to align with the dominant propagation paths.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation