DocumentCode :
3130966
Title :
Imperfect secrecy in wiretap channel II
Author :
Cheng, Fan ; Yeung, Raymond W. ; Shum, Kenneth W.
Author_Institution :
Dept. of Inf. Eng., Chinese Univ. of Hong Kong, Hong Kong, China
fYear :
2012
fDate :
1-6 July 2012
Firstpage :
71
Lastpage :
75
Abstract :
In a point-to-point communication system which consists of a sender s, a receiver t and a set of noiseless channels, the senders wants to transmit a private message to the receiver t through the channels which may be eavesdropped by a wiretapper. The wiretapper can access any one but not more than one set of channels, which is referred to as a wiretap set. It is assumed that from each wiretap set, the wiretapper can obtain some partial information about the private message which is measured by the wiretapper´s equivocation. The security strategy is to encode the message with some random key. Under these settings, we define an achievable rate tuple in terms of the message, the key and the wiretapper´s equivocation, and prove a tight rate region of the rate tuples.
Keywords :
cryptography; encoding; telecommunication security; imperfect secrecy; noiseless channels; point-to-point communication system; private message; random key; rate region; rate tuples; wiretap channel; wiretap set; wiretapper equivocation; Encoding; Network coding; Receivers; Imperfect secrecy; secret sharing; wiretap channel;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on
Conference_Location :
Cambridge, MA
ISSN :
2157-8095
Print_ISBN :
978-1-4673-2580-6
Electronic_ISBN :
2157-8095
Type :
conf
DOI :
10.1109/ISIT.2012.6284653
Filename :
6284653
Link To Document :
بازگشت