Skip to Main content Skip to Navigation

Security for wireless communications

Abstract : Today, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario.
Document type :
Complete list of metadata

Cited literature [121 references]  Display  Hide  Download
Contributor : ABES STAR :  Contact
Submitted on : Wednesday, April 24, 2019 - 4:59:21 PM
Last modification on : Saturday, June 25, 2022 - 9:12:35 PM


Version validated by the jury (STAR)


  • HAL Id : tel-02109254, version 1



Sarah Kamel. Security for wireless communications. Cryptography and Security [cs.CR]. Télécom ParisTech, 2017. English. ⟨NNT : 2017ENST0011⟩. ⟨tel-02109254⟩



Record views


Files downloads