DocumentCode
3435902
Title
Secrecy Capacity of Semi-deterministic Wire-tap Channels
Author
Grubb, Jared ; Vishwanath, Sriram ; Liang, Yingbin ; Poor, H. Vincent
Author_Institution
Univ. of Texas at Austin, Austin
fYear
2007
fDate
1-6 July 2007
Firstpage
1
Lastpage
4
Abstract
This paper studies secrecy capacity in a semi-deterministic setting, in which the channel between legitimate users (called Alice and Bob) is deterministic, while that between Alice and the eavesdropper (called Eve) is a discrete memoryless channel. Such a model is particularly relevant when a pre-existing error correcting code tailored to the legitimate channel is in use on top of which secret information is to be shared. First, a point-to-point setting is considered with a single wiretapper, a situation in which the secrecy capacity has an elegant characterization. Next, a generalized multiple access setting with confidential messages is considered in which each user wishes to communicate secret information to a common destination without the other determining its message. In this latter situation, outer bounds on the secrecy capacity are obtained.
Keywords
information theory; security of data; telecommunication security; deterministic channel; discrete memoryless channel; eavesdropper; error correcting code; generalized multiple access setting; legitimate channel; secrecy capacity; secret information; semi-deterministic wire-tap channel; wiretapper; Broadcasting; Communication networks; Constraint theory; Decoding; Error correction codes; Information analysis; Memoryless systems; Relays; Reliability theory; Telecommunication network reliability;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory for Wireless Networks, 2007 IEEE Information Theory Workshop on
Conference_Location
Solstrand
Print_ISBN
978-1-4244-1200-6
Electronic_ISBN
978-1-4244-1200-6
Type
conf
DOI
10.1109/ITWITWN.2007.4318063
Filename
4318063
Link To Document