메뉴 건너뛰기




Volumn 54, Issue 11, 2008, Pages 5059-5067

The wiretap channel with feedback: Encryption over the channel

Author keywords

Feedback; Modulo additive; Noisy; Secrecy capacity; Wiretap channel

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CONTROL THEORY; CRYPTOGRAPHY; FEEDBACK;

EID: 55349095058     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.929914     Document Type: Article
Times cited : (127)

References (32)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0009801824 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Bruges Brugge, Belgium, May
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. Advances in Cryptology-EUROCRYPT, Bruges (Brugge), Belgium, May 2000, pp. 356-373.
    • (2000) Proc. Advances in Cryptology-EUROCRYPT , pp. 356-373
    • Maurer, U.M.1    Wolf, S.2
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 7
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 8
    • 0033891095 scopus 로고    scopus 로고
    • Csiszár and P. Narayan, Common randomness and secret key generation with a helper, IEEE Trans. Inf. Theory, 46, no. 2, pp. 344-366, Mar. 2000.
    • Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
  • 9
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 10
    • 0037396695 scopus 로고    scopus 로고
    • Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds
    • Apr
    • U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 11
    • 0037399113 scopus 로고    scopus 로고
    • Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition
    • Apr
    • U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 12
    • 0037396951 scopus 로고    scopus 로고
    • Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification
    • Apr
    • U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification," IEEE Trans. Inf. Theory vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 13
    • 40949121595 scopus 로고    scopus 로고
    • Achievable rates for two-way wire-tap channels
    • Nice, France, Jun
    • E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Intl. Symp. Information Theory, Nice, France, Jun. 2007, pp. 941-945.
    • (2007) Proc. IEEE Intl. Symp. Information Theory , pp. 941-945
    • Tekin, E.1    Yener, A.2
  • 14
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 15
    • 45249119255 scopus 로고    scopus 로고
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, 54, no. 6, pp. 2470-2492, Jun. 2008.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
  • 18
    • 33749450172 scopus 로고    scopus 로고
    • Secrecy capacity of SIMO and slow fading channels
    • Adelaide, Australia, Sep
    • P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Information Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155.
    • (2005) Proc. IEEE Int. Symp. Information Theory , pp. 2152-2155
    • Parada, P.1    Blahut, R.2
  • 19
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel
    • to be published
    • E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, to be published.
    • IEEE Trans. Inf. Theory
    • Tekin, E.1    Yener, A.2
  • 20
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 21
    • 40949147785 scopus 로고    scopus 로고
    • Multiple access channels with confidential messages
    • Mar
    • Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 22
    • 39049089566 scopus 로고    scopus 로고
    • The discrete memory-less multiple access channel with confidential messages
    • Seattle, WN, Jul
    • R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "The discrete memory-less multiple access channel with confidential messages," in Proc. IEEE Intl. Symp. Information Theory, Seattle, WN, Jul. 2006, pp. 957-961.
    • (2006) Proc. IEEE Intl. Symp. Information Theory , pp. 957-961
    • Liu, R.1    Maric, I.2    Yates, R.D.3    Spasojevic, P.4
  • 23
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Cairns, Australia, Sep
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop, Cairns, Australia, Sep. 2001, pp. 87-89.
    • (2001) Proc. IEEE Information Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 24
    • 70349947340 scopus 로고    scopus 로고
    • Relay channels with confidential messages
    • submitted for publication
    • Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Inf. Theory, submitted for publication.
    • IEEE Trans. Inf. Theory
    • Oohama, Y.1
  • 25
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memory-less interference and broadcast channels with confidential messages: Secrecy capacity regions
    • Jun
    • R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memory-less interference and broadcast channels with confidential messages: Secrecy capacity regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.D.4
  • 26
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory., vol. 54, no. 9, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9
    • Lai, L.1    El Gamal, H.2
  • 27
    • 33646073724 scopus 로고    scopus 로고
    • An achievable region for the Gaussian wiretap channel with side information
    • May
    • C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.5 , pp. 2181-2190
    • Mitrpant, C.1    Vinck, A.J.H.2    Luo, Y.3
  • 28
    • 5144231861 scopus 로고    scopus 로고
    • On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener
    • Monticello, IL
    • G. D. Forney, Jr, "On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener," in Proc. Allerton Conf. Communication, Control, and Computing, Monticello, IL, 2003.
    • (2003) Proc. Allerton Conf. Communication, Control, and Computing
    • Forney Jr, G.D.1
  • 29
    • 0034188157 scopus 로고    scopus 로고
    • Sphere-bound-achieving coset codes and multilevel coset codes
    • May
    • G. D. Forney, Jr, "Sphere-bound-achieving coset codes and multilevel coset codes," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 820-850, May 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.3 , pp. 820-850
    • Forney Jr, G.D.1
  • 30
    • 0026837809 scopus 로고
    • Trellis precoding: Combined coding, precoding and shaping for intersymbol interference channels
    • Mar
    • M. V. Eyuboglu and G. D. Forney, Jr, "Trellis precoding: Combined coding, precoding and shaping for intersymbol interference channels," IEEE Trans. Inf. Theory, vol. 38, no. 2, pp. 301-314, Mar. 1992.
    • (1992) IEEE Trans. Inf. Theory , vol.38 , Issue.2 , pp. 301-314
    • Eyuboglu, M.V.1    Forney Jr, G.D.2
  • 31
    • 5144221013 scopus 로고    scopus 로고
    • Achieving 1/2 log(1 + SNR) on the AWGN channel with lattice encoding and decoding
    • Oct
    • U. Erez and R. Zamir, "Achieving 1/2 log(1 + SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.10 , pp. 2293-2314
    • Erez, U.1    Zamir, R.2
  • 32
    • 2942653060 scopus 로고    scopus 로고
    • Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels
    • Jun
    • H. El Gamal, G. Caire, and M. O. Damen, "Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels," IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 968-985, Jun. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.6 , pp. 968-985
    • El Gamal, H.1    Caire, G.2    Damen, M.O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.