메뉴 건너뛰기




Volumn 43, Issue 3, 1997, Pages 827-835

Rate-distortion theory for the Shannon cipher system

Author keywords

Broadcast channel; Coding theorem; Rate distortion theory; Shannon cipher system; Wiretap channel

Indexed keywords

CODING ERRORS; CRYPTOGRAPHY; FLOWCHARTING; SIGNAL RECEIVERS; SIGNAL TO NOISE RATIO; THEOREM PROVING;

EID: 0031143282     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/18.568694     Document Type: Article
Times cited : (131)

References (19)
  • 1
    • 33747497952 scopus 로고
    • Information theory in cryptology
    • Sept.
    • H. Yamamoto, "Information theory in cryptology," IEICE Trans., vol. E74, no. 9, pp. 2456-2468, Sept. 1991.
    • (1991) IEICE Trans. , vol.E74 , Issue.9 , pp. 2456-2468
    • Yamamoto, H.1
  • 2
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 565-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 565-715
    • Shannon, C.E.1
  • 3
    • 0017495002 scopus 로고
    • An extension of the Shannon theory approach to cryptography
    • M. E. Hellman, "An extension of the Shannon theory approach to cryptography," IEEE Trans. Inform. Theory, vol. IT-23, no. 3, pp. 289-294, 1977.
    • (1977) IEEE Trans. Inform. Theory , vol.IT-23 , Issue.3 , pp. 289-294
    • Hellman, M.E.1
  • 4
    • 0018305541 scopus 로고
    • Bounds on key equivocation for simple substitution ciphers
    • R. J. Blom, "Bounds on key equivocation for simple substitution ciphers," IEEE Trans. Inform. Theory, vol. IT-25, no. 1, pp. 8-18, 1979.
    • (1979) IEEE Trans. Inform. Theory , vol.IT-25 , Issue.1 , pp. 8-18
    • Blom, R.J.1
  • 5
    • 0018491845 scopus 로고
    • Random ciphering bounds on a class of secrecy systems and discrete message sources
    • S. C. Lu, "Random ciphering bounds on a class of secrecy systems and discrete message sources," IEEE Trans. Inform. Theory, vol. IT-25, no. 4, pp. 405-414, 1979.
    • (1979) IEEE Trans. Inform. Theory , vol.IT-25 , Issue.4 , pp. 405-414
    • Lu, S.C.1
  • 6
    • 0018491846 scopus 로고
    • The existence of good cryptosystems for key rates greater than the message redundancy
    • _, "The existence of good cryptosystems for key rates greater than the message redundancy," IEEE Trans. Inform. Theory, vol. IT-25, no. 4, pp. 475-477, 1979.
    • (1979) IEEE Trans. Inform. Theory , vol.IT-25 , Issue.4 , pp. 475-477
  • 7
    • 0019058426 scopus 로고
    • Bounds on message equivocation for simple substitution ciphers
    • J. G. Dunham, "Bounds on message equivocation for simple substitution ciphers," IEEE Trans. Inform. Theory, vol. IT-26, no. 5, pp. 522-527, 1980.
    • (1980) IEEE Trans. Inform. Theory , vol.IT-26 , Issue.5 , pp. 522-527
    • Dunham, J.G.1
  • 8
    • 0020289167 scopus 로고
    • Remarks on Shannon's secrecy systems
    • R. Ahlswede, "Remarks on Shannon's secrecy systems," Probl. Contr. Inform. Theory, vol. 11, no. 4, pp. 301-318, 1982.
    • (1982) Probl. Contr. Inform. Theory , vol.11 , Issue.4 , pp. 301-318
    • Ahlswede, R.1
  • 9
  • 10
    • 0020716877 scopus 로고
    • Error probabilities for simple substitution ciphers
    • A. Sgarro, "Error probabilities for simple substitution ciphers," IEEE Trans. Inform. Theory, vol. IT-29, no. 2, pp. 190-198, 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , Issue.2 , pp. 190-198
    • Sgarro, A.1
  • 11
    • 0021166536 scopus 로고
    • An upper bound on the key equivocation for pure cipher
    • R. J. Blom, "An upper bound on the key equivocation for pure cipher," IEEE Trans. Inform. Theory, vol. IT-30, no. 1, pp. 82-84, 1984.
    • (1984) IEEE Trans. Inform. Theory , vol.IT-30 , Issue.1 , pp. 82-84
    • Blom, R.J.1
  • 12
    • 0028346503 scopus 로고
    • Coding theorems for Shannon's cipher system with correlated source outputs, and common information
    • H. Yamamoto, "Coding theorems for Shannon's cipher system with correlated source outputs, and common information," IEEE Trans. Inform. Theory, vol. 40, no. 1, pp. 85-95, 1994.
    • (1994) IEEE Trans. Inform. Theory , vol.40 , Issue.1 , pp. 85-95
    • Yamamoto, H.1
  • 13
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. IT-24, no. 3, pp. 339-348, 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 15
    • 0020843592 scopus 로고
    • A source coding problem for sources with additional outputs to keep secret from the receiver or wiretapper
    • H. Yamamoto, "A source coding problem for sources with additional outputs to keep secret from the receiver or wiretapper," IEEE Trans. Inform. Theory, vol. IT-29, no. 6, pp. 918-923, 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , Issue.6 , pp. 918-923
    • Yamamoto, H.1
  • 16
    • 0024035415 scopus 로고
    • A rate-distortion problem for a communication system with a secondary decoder to be hindered
    • _, "A rate-distortion problem for a communication system with a secondary decoder to be hindered," IEEE Trans. Inform. Theory, vol. 34, no. 4, pp. 835-842, 1988.
    • (1988) IEEE Trans. Inform. Theory , vol.34 , Issue.4 , pp. 835-842
  • 17
    • 0024666944 scopus 로고
    • Coding theorem for secret sharing communication systems with two noisy channels
    • _, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Trans. Inform. Theory, vol. 35, no. 3, pp. 572-578, 1989.
    • (1989) IEEE Trans. Inform. Theory , vol.35 , Issue.3 , pp. 572-578
  • 18
    • 0026153306 scopus 로고
    • A coding theorem for secret sharing communication systems with two Gaussian channels
    • _, "A coding theorem for secret sharing communication systems with two Gaussian channels," IEEE Trans. Inform. Theory, vol. 37, no. 3, pp. 634-638, 1991.
    • (1991) IEEE Trans. Inform. Theory , vol.37 , Issue.3 , pp. 634-638


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.