2018
DOI: 10.1109/lsp.2017.2773128
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communications With Asymptotically Gaussian Compressed Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Cho and Yu studied a particular measurement matrix for secure communication in the multicarrier system [75]. The measurement matrix is given as…”
Section: A Wireless Wiretap Channelmentioning
confidence: 99%
See 2 more Smart Citations
“…Cho and Yu studied a particular measurement matrix for secure communication in the multicarrier system [75]. The measurement matrix is given as…”
Section: A Wireless Wiretap Channelmentioning
confidence: 99%
“…CS-Based Secrecy [68] Build up a secure wireless wiretap channel by leveraging the channel asymmetry Secrecy Capacity [69] Quantitatively investigate the lower and upper bounds of the secrecy capacity The Secrecy Based on Distributed CS [126] Design an amplify-forward scheme to cater the distribute nature of wireless sensor network The Secrecy Based on MIMO Precoding [71] Simultaneously maximize the secrecy and the signal-to-noise ratio The Secrecy Based on Circulant Matrix [72] Guarantee the wireless indistinguishability security with some conditions Multicarrier System [73]- [75] Induce artificial noise/channel randomization/particular measurement matrix for the security Cooperative Networks [76] Own the superiority of energy harvesting and high secrecy capacity Establishing Secure Measurement Matrix [77], [78] Design measurement matrix with reciprocal quantization/channel measurements Integrity-Protected CS [79] AES for the encryption of measurements and hash algorithm for integrity checking Capturing Medical Data [80] Capture data firstly and then encrypt them Data Gathering [81]- [84] Combine pseudorandom permutations and symmetric/additively homomorphic encryption Compressed Detection [85], [86] Perform collaborative compressed detection at distributed nodes Adaptive CS for Smart Objects [87] Utilize the information of smart objects to adapt the CS measurement condition Frequency Selection for Static Environment [88], [89] Enlarge the entropy of measured channel and accelerate the rate of generating keys Chaotic CS for Internet of Multimedia Things [90] Realize low-cost sampling and confidentiality preservation Secure Interaction with Cloud [91] Random compressed encryption for the raw data Crowdsensing [92]- [94] Maximize the geographic map coverage and protect the participants' trace privacy Smart Grid [95]- [97] Construct a secret measurement matrix for joint encryption, sampling, and compression Wireless Body Area Networks [98]- [100] Exploit chaotic CS for energy saving and data security a long delay off over fading channels…”
Section: Security Model Performancementioning
confidence: 99%
See 1 more Smart Citation
“…Then, they quantitatively showed that the B-OTS cryptosystem and its class dependent variations can be resistant against known plaintext attacks in [37]. In [38], the security of the asymptotically Gaussian-OTS (AG-OTS) cryptosystem, which employs random Bernoulli matrices multiplied by a unitary matrix, has been discussed in the presence of wireless channels. In addition, the indistinguishability [39] of the G-OTS and the B-OTS cryptosystems has been studied in [40], which turned out to be highly sensitive to energy variation of plaintexts.…”
Section: Introductionmentioning
confidence: 99%