DocumentCode :
2423240
Title :
Using a secret key to foil an eavesdropper
Author :
Cuff, Paul
Author_Institution :
Dept. of Electr. Eng., Princeton Univ., Princeton, NJ, USA
fYear :
2010
fDate :
Sept. 29 2010-Oct. 1 2010
Firstpage :
1405
Lastpage :
1411
Abstract :
This work addresses secrecy with distributed systems in mind. We consider an adversary who wishes to attack a system and find the optimal communication and use of secret key to share information in such a system. Instead of measuring secrecy by “equivocation,” we define a value function for the system, based on the actions of the system and the adversary, and set out to design a system that maximizes the average value obtained against the worst adversary.
Keywords :
private key cryptography; telecommunication security; distributed systems; eavesdropper; equivocation; secret key; telecommunication security; value function; Decoding; Encryption; Markov processes; Noise measurement; Receivers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication, Control, and Computing (Allerton), 2010 48th Annual Allerton Conference on
Conference_Location :
Allerton, IL
Print_ISBN :
978-1-4244-8215-3
Type :
conf
DOI :
10.1109/ALLERTON.2010.5707078
Filename :
5707078
Link To Document :
بازگشت