搜索结果: 1-11 共查到“erasure”相关记录11条 . 查询时间(0.093 秒)
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Oblivious transfer generalized erasure channel oblivious transfer capacity
2016/1/6
Noisy channels are a powerful resource for cryptography as they can be
used to obtain information-theoretically secure key agreement, commitment
and oblivious transfer protocols, among others. Obliv...
Synthesis for Optimal Two-Player Decentralized Control over TCP Erasure Channels with State Feedback
wo-Player Decentralized Control TCP
2015/6/19
We propose a state-space synthesis for infinite horizon decentralized LQG control problems over TCP erasure channels with state feedback under sufficient conditions on convergence and stability. The d...
An Explicit Solution for Optimal Two-Player Decentralized Control over a TCP Erasure Channel with State Feedback
Decentralized Control over Explicit Solution
2015/6/19
We develop an optimal controller synthesis algorithm for decentralized control problems where control actions are transmitted through TCP-like erasure channels. We consider a simple two-player interco...
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
Code based cryptography Polar codes
2014/3/11
This paper proposes an efficient secret key cryptosystem based on polar codes over Binary Erasure Channel. We introduce a method, for the first time to our knowledge, to hide the generator matrix of t...
Tree Codes Improve Convergence Rate of Consensus Over Erasure Channels
Tree Codes Convergence Rate of Consensus Erasure Channels Optimization and Control
2012/4/17
We study the problem of achieving average consensus between a group of agents over a network with erasure links. In the context of consensus problems, the unreliability of communication links between ...
Throughput and Latency of Acyclic Erasure Networks with Feedback in a Finite Buffer Regime
Throughput Latency of Acyclic Erasure Networks Feedback Finite Buffer Regime
2011/1/21
The exact Markov modeling analysis of erasure networks with finite buffers is an extremely hard problem due to the large number of states in the system. In such networks,packets are lost due to either...
Tree-Structure Expeactation Propagation for LDPC Decoding in Erasure Channels
heavy tails truncation second order regular variation
2010/12/9
The problem of estimating the tail index from truncated data is addressed in Chakrabarty and Samorodnitsky (2009). In that paper.
Multiuser broadcast erasure channel with feedback - capacity and algorithms
Broadcast erasure channels feedback-based coding capacity achieving algorithms
2010/12/1
We consider the N-user broadcast erasure channel where feedback from the users is fed back to the transmitter in the form of ACK messages.
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious
Information-theoretic security oblivious transfer oblivious transfer capacity
2009/12/29
Information-theoretically secure string oblivious transfer (OT) can be
constructed based on discrete memoryless channel (DMC). The oblivious
transfer capacity of a channel characterizes – similarly ...
Making Collusion-Secure Codes (More) Robust against Bit Erasure
Collusion-secure code bit erasure tolerance general conversion
2009/11/18
A collusion-secure code is called robust if it is secure against erasure of a limited number of undetectable
bits, in addition to collusion attacks under Marking Assumption. In this article, we propo...
An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without Erasure
2007/11/2
AbstractTransformation of the widely used Pedersen's Verifiable Secret Sharing (Pedersen-VSS) to Pedersen-VSS-General secure against general adversary is first presented. Then a misunderstanding about...