Imperfect Secrecy in Wiretap Channel II

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

The full version of the 2012 ISIT paper

Scientific paper

In a point-to-point communication system which consists of a sender s, a receiver t and a set of noiseless channels, the sender s wants to transmit a private message to the receiver t through the channels which may be eavesdropped by a wiretapper. The wiretapper can access any one but not more than one set of channels. It is assumed that from each wiretap set, the wiretapper can obtain some partial information about the private message which is measured by the wiretapper's equivocation. The security strategy is to encode the message with some random key. Under these settings, we define an achievable rate tuple in terms of the message, the key and the wiretapper's equivocation and prove a tight rate region of the rate tuples.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Imperfect Secrecy in Wiretap Channel II does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Imperfect Secrecy in Wiretap Channel II, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Imperfect Secrecy in Wiretap Channel II will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-329939

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.