Computer Science – Information Theory
Scientific paper
2012-02-04
Computer Science
Information Theory
The full version of the 2012 ISIT paper
Scientific paper
In a point-to-point communication system which consists of a sender s, a receiver t and a set of noiseless channels, the sender s wants to transmit a private message to the receiver t through the channels which may be eavesdropped by a wiretapper. The wiretapper can access any one but not more than one set of channels. It is assumed that from each wiretap set, the wiretapper can obtain some partial information about the private message which is measured by the wiretapper's equivocation. The security strategy is to encode the message with some random key. Under these settings, we define an achievable rate tuple in terms of the message, the key and the wiretapper's equivocation and prove a tight rate region of the rate tuples.
Cheng Fan
Shum Kenneth W.
Yeung Raymond W.
No associations
LandOfFree
Imperfect Secrecy in Wiretap Channel II does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Imperfect Secrecy in Wiretap Channel II, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Imperfect Secrecy in Wiretap Channel II will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-329939