메뉴 건너뛰기




Volumn 54, Issue 12, 2008, Pages 5747-5755

The Gaussian multiple access wire-tap channel

Author keywords

Gaussian multiple access channel; Secrecy capacity; Wire tap channel

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); PROGRAMMING THEORY; SIGNAL RECEIVERS; TIME DIVISION MULTIPLE ACCESS; WIRE;

EID: 57349093480     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.2006422     Document Type: Article
Times cited : (261)

References (33)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 3
    • 0017495724 scopus 로고
    • A note on Wyner's wiretap channel
    • May
    • A. B. Carleial and M. E. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. IT-23, no. 3, pp. 387-390, May 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.IT-23 , Issue.3 , pp. 387-390
    • Carleial, A.B.1    Hellman, M.E.2
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 8
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, part I: Secret sharing
    • Jul
    • R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahslwede, R.1    Csiszár, I.2
  • 9
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography, Part II: CR capacity
    • Jan
    • R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahslwede, R.1    Csiszár, I.2
  • 10
    • 0031647696 scopus 로고    scopus 로고
    • The common randomness capacity of a pair of independent discrete memoryless channels
    • Jan
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 215-224, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 215-224
    • Venkatesan, S.1    Anantharam, V.2
  • 11
    • 0033892497 scopus 로고    scopus 로고
    • The common randomness capacity of a network of discrete memoryless channels
    • Mar
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Trans. Inf. Theory vol. 46, no. 2, pp. 367-387, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 367-387
    • Venkatesan, S.1    Anantharam, V.2
  • 12
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 13
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 14
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Berlin, Germany, May
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000, Lecture Notes in Comput. Sci., Berlin, Germany, May 2000, vol. 1807, pp. 351-368.
    • (2000) Proc. EUROCRYPT 2000, Lecture Notes in Comput. Sci , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 15
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 16
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.1    Wolf, S.2
  • 17
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 18
    • 0022722755 scopus 로고
    • On secret sharing communication systems with two or three channels
    • May
    • H. Yamamoto, "On secret sharing communication systems with two or three channels," IEEE Trans. Inf. Theory, vol. IT-32, no. 3, pp. 387-393, May 1986.
    • (1986) IEEE Trans. Inf. Theory , vol.IT-32 , Issue.3 , pp. 387-393
    • Yamamoto, H.1
  • 19
    • 0026153306 scopus 로고
    • A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
    • May
    • H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.3 , pp. 634-638
    • Yamamoto, H.1
  • 20
    • 39049144353 scopus 로고    scopus 로고
    • Secrecy capacity of wireless channels
    • Seattle, WA, Jul. 9-14
    • J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 356-360.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory , pp. 356-360
    • Barros, J.1    Rodrigues, M.R.D.2
  • 24
    • 84940648008 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages
    • Monticello, IL, Sep. 27-29
    • R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "Discrete memoryless interference and broadcast channels with confidential messages," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
    • (2006) Proc. Allerton Conf. Commun. Control Comput
    • Liu, R.1    Maric, I.2    Yates, R.D.3    Spasojevic, P.4
  • 25
    • 45249119708 scopus 로고    scopus 로고
    • Generalized multiple access channels with confidential messages
    • to appear
    • Y. Liang and V. Poor, "Generalized multiple access channels with confidential messages," IEEE Trans. Inf. Theory, to appear.
    • IEEE Trans. Inf. Theory
    • Liang, Y.1    Poor, V.2
  • 26
    • 39049089566 scopus 로고    scopus 로고
    • The discrete memoryless multiple access channel with confidential messages
    • Seattle, WA, Jul. 9-14
    • R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 957-961.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory , pp. 957-961
    • Liu, R.1    Maric, I.2    Yates, R.D.3    Spasojevic, P.4
  • 27
    • 33847609636 scopus 로고    scopus 로고
    • On secure signaling for the Gaussian multiple access wire-tap channel
    • Asilomar, CA, Oct. 28-Nov. 1
    • E. Tekin, S. Serbetli, and A. Yener, "On secure signaling for the Gaussian multiple access wire-tap channel," in Proc. Asilomar Conf. Signal Syst. Comput., Asilomar, CA, Oct. 28-Nov. 1 2005, pp. 1747-1751.
    • (2005) Proc. Asilomar Conf. Signal Syst. Comput , pp. 1747-1751
    • Tekin, E.1    Serbetli, S.2    Yener, A.3
  • 28
    • 0017918923 scopus 로고
    • Interference channels
    • Jan
    • A. B. Carleial, "Interference channels," IEEE Trans. Inf. Theory vol. IT-24, no. 1, pp. 60-70, Jan. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.1 , pp. 60-70
    • Carleial, A.B.1
  • 29
    • 39049168628 scopus 로고    scopus 로고
    • The Gaussian multiple-access wire-tap channel with collective secrecy constraints
    • Seattle, WA, Jul. 9-14
    • E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel with collective secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 1164-1168.
    • (2006) Proc. IEEE Int. Symp. Inf. Theory , pp. 1164-1168
    • Tekin, E.1    Yener, A.2
  • 32
    • 84940659555 scopus 로고    scopus 로고
    • Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
    • Monticello, IL, Sep. 27-29
    • E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
    • (2006) Proc. Allerton Conf. Commun. Control Comput
    • Tekin, E.1    Yener, A.2
  • 33
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.