메뉴 건너뛰기




Volumn 52, Issue 3, 2006, Pages 1269-1273

On the shannon cipher system with a capacity-limited key-distribution channel

Author keywords

Cryptography; Encryption; Key distribution; Shannon cipher system; Source channel separation

Indexed keywords

DECRYPTION; KEY DISTRIBUTION; SHANNON CIPHER SYSTEM; SOURCE CHANNEL SEPARATION;

EID: 33947367439     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2005.864448     Document Type: Article
Times cited : (13)

References (15)
  • 1
    • 0037711218 scopus 로고    scopus 로고
    • To Code or Not to Code,
    • D.Sc. dissertation, EPFL, Lausanne, Switzerland
    • M. Gastpar, "To Code or Not to Code," D.Sc. dissertation, EPFL, Lausanne, Switzerland, 2003.
    • (2003)
    • Gastpar, M.1
  • 2
    • 0015648450 scopus 로고
    • A new class of lower bounds to information rates od stationary sources via conditional rate-distortion functions
    • Jul
    • R. M. Gray, "A new class of lower bounds to information rates od stationary sources via conditional rate-distortion functions," IEEE Trans. Inf. Theory, vol. IT-19, no. 4, pp. 480-489, Jul. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.IT-19 , Issue.4 , pp. 480-489
    • Gray, R.M.1
  • 4
    • 0028548322 scopus 로고
    • Rate-distortion function when side-information may be present at the decoder
    • Nov
    • A. H. Kaspi, "Rate-distortion function when side-information may be present at the decoder," IEEE Trans. Inf. Theory, vol. 40, no. 6, pp. 2031-2034, Nov. 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.6 , pp. 2031-2034
    • Kaspi, A.H.1
  • 5
    • 23844495277 scopus 로고    scopus 로고
    • On joint information embedding and lossy compression
    • Aug
    • A. Maor and N. Merhav, "On joint information embedding and lossy compression," IEEE Trans. Inf. Theory, vol. 51, no. 8, pp. 2998-3008, Aug. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.8 , pp. 2998-3008
    • Maor, A.1    Merhav, N.2
  • 6
    • 0024012644 scopus 로고
    • An introduction to contemporary cryptology
    • May
    • J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 26, no. 5, pp. 533-549, May 1988.
    • (1988) Proc. IEEE , vol.26 , Issue.5 , pp. 533-549
    • Massey, J.L.1
  • 7
    • 33144467852 scopus 로고    scopus 로고
    • On joint coding for watermarking and encryption
    • Jan
    • N. Merhav, "On joint coding for watermarking and encryption," IEEE Trans. Inf. Theory, vol. 52, no. 1, pp. 190-205, Jan. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.1 , pp. 190-205
    • Merhav, N.1
  • 8
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 3, pp. 565-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.3 , pp. 565-715
    • Shannon, C.E.1
  • 9
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • Jul
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. IT-19, no. 4, pp. 471-480, Jul. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.IT-19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 10
    • 0029734858 scopus 로고    scopus 로고
    • Simulation of random processes and rate-distortion theory
    • Jan
    • Y. Steinberg and S. Verdú, "Simulation of random processes and rate-distortion theory," IEEE Trans. Inf. Theory, vol. 42, no. 1, pp. 63-86, Jan. 1996.
    • (1996) IEEE Trans. Inf. Theory , vol.42 , Issue.1 , pp. 63-86
    • Steinberg, Y.1    Verdú, S.2
  • 11
    • 0016882596 scopus 로고
    • The rate-distortion function for source coding with side information at the decoder
    • Jan
    • A. D. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inf. Theory, vol. IT-22, no. 1, pp. 1-10, Jan. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.1 , pp. 1-10
    • Wyner, A.D.1    Ziv, J.2
  • 12
    • 0024666944 scopus 로고
    • Coding theorem for secret sharing communication systems with two noisy channels
    • May
    • H. Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Trans. Inf. Theory, vol. 35, no. 3, pp. 572-578, May 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.3 , pp. 572-578
    • Yamamoto, H.1
  • 13
    • 33747497952 scopus 로고
    • Information theory in cryptology
    • Sep
    • _, "Information theory in cryptology," Trans. IEICE, vol. E 74, no. 9, pp. 2456-2464, Sep. 1991.
    • (1991) Trans. IEICE , vol.E 74 , Issue.9 , pp. 2456-2464
    • Yamamoto, H.1
  • 14
    • 0026153306 scopus 로고
    • Coding theorem for secret sharing communication systems with two Gaussian wiretap channels
    • May
    • _, "Coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.3 , pp. 634-638
    • Yamamoto, H.1
  • 15
    • 0031143282 scopus 로고    scopus 로고
    • Rate-distortion theory for the shannon cipher system
    • May
    • _, "Rate-distortion theory for the shannon cipher system," IEEE Trans. Inf. Theory, vol. 43, no. 3, pp. 827-835, May 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.3 , pp. 827-835
    • Yamamoto, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.