Computer Science – Information Theory
Scientific paper
2010-08-03
Computer Science
Information Theory
Globecom 2010, 5 pages, no figures, uses IEEEtran.cls
Scientific paper
We consider theoretical limits of partial secrecy in a setting where an eavesdropper attempts to causally reconstruct an information sequence with low distortion based on an intercepted transmission and the past of the sequence. The transmitter and receiver have limited secret key at their disposal but not enough to establish perfect secrecy with a one-time pad. From another viewpoint, the eavesdropper is acting as an adversary, competing in a zero-sum repeated game against the sender and receiver of the secrecy system. In this case, the information sequence represents a sequence of actions, and the distortion function captures the payoff of the game. We give an information theoretic region expressing the tradeoff between secret key rate and max-min distortion for the eavesdropper. We also simplify this characterization to a linear program. As an example, we discuss how to optimally use secret key to hide Bernoulli-p bits from an eavesdropper so that they incur maximal Hamming distortion.
No associations
LandOfFree
A Framework for Partial Secrecy does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A Framework for Partial Secrecy, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Framework for Partial Secrecy will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-615420