메뉴 건너뛰기




Volumn 6, Issue 3 PART 1, 2011, Pages 595-605

Strongly secure communications over the two-way wiretap channel

Author keywords

Key generation; resolvability; secure communications; strong secrecy; two way wiretap channel

Indexed keywords

KEY GENERATION; RESOLVABILITY; SECURE COMMUNICATIONS; STRONG SECRECY; WIRETAP CHANNEL;

EID: 80051727482     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2158422     Document Type: Article
Times cited : (67)

References (30)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 3
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 4
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. secret sharing", IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 5
    • 76249114101 scopus 로고    scopus 로고
    • Foundations and Trends in Communications and Information Theory. Delft, The Netherlands: Now Publishers
    • Y. Liang, H. V. Poor, and S. S. (Shitz), Information-Theoretic Security, ser. Foundations and Trends in Communications and Information Theory. Delft, The Netherlands: Now Publishers, 2009, vol. 5.
    • (2009) Information-theoretic Security, Ser. , vol.5
    • Liang, Y.1    Poor, H.V.2    Shitz, S.S.3
  • 7
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 8
    • 77955729519 scopus 로고    scopus 로고
    • Correction to: The Gaussian multiple access wire-tap channel and the general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
    • Sep
    • E. Tekin and A. Yener, "Correction to: The Gaussian multiple access wire-tap channel and the general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming", IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4762-4763, Sep. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4762-4763
    • Tekin, E.1    Yener, A.2
  • 10
    • 70449504460 scopus 로고    scopus 로고
    • Channel scrambling for secrecy
    • Seoul, Korea, Jul
    • M. Bloch, "Channel scrambling for secrecy", in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jul. 2009, pp. 2452-2456.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory , pp. 2452-2456
    • Bloch, M.1
  • 11
    • 77954826162 scopus 로고    scopus 로고
    • New achievable secrecy rate regions for the two-way wiretap channel
    • Cairo, Egypt, Jan
    • A. E. Gamal, O. O. Koyluoglu, M. Youssef, and H. E. Gamal, "New achievable secrecy rate regions for the two-way wiretap channel", in Proc. IEEE Inf. Theory Workshop, Cairo, Egypt, Jan. 2010, pp. 1-5.
    • (2010) Proc. IEEE Inf. Theory Workshop , pp. 1-5
    • Gamal, A.E.1    Koyluoglu, O.O.2    Youssef, M.3    Gamal, H.E.4
  • 14
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov
    • L. Lai, H. E. Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel", IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    Gamal, H.E.2    Poor, H.V.3
  • 16
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • DOI 10.1109/18.825796
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper", IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 17
    • 77955682475 scopus 로고    scopus 로고
    • Secret key agreement from vector Gaussian sources by rate-limited public communication
    • Austin, TX, Jun
    • S. Watanabe and Y. Oohama, "Secret key agreement from vector Gaussian sources by rate-limited public communication", in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, Jun. 2010, pp. 2597-2601.
    • (2010) Proc. IEEE Int. Symp. Inf. Theory , pp. 2597-2601
    • Watanabe, S.1    Oohama, Y.2
  • 18
    • 0027602480 scopus 로고
    • Approximation theory of output statistics
    • May
    • T. Han and S. Verdú, "Approximation theory of output statistics", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 752-772
    • Han, T.1    Verdú, S.2
  • 19
    • 0032022516 scopus 로고    scopus 로고
    • Resolvability theory for the multiple-access channel
    • PII S0018944898009304
    • Y. Steinberg, "Resolvability theory for the multiple-access channel", IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 472-487, Mar. 1998. (Pubitemid 128737616)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.2 , pp. 472-487
    • Steinberg, Y.1
  • 21
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
    • Apr
    • M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels", IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 24
    • 80051928178 scopus 로고    scopus 로고
    • Multiple access wiretap channels with strong secrecy
    • Dublin, Ireland, Sep
    • M. H. Yassaee and M. R. Aref, "Multiple access wiretap channels with strong secrecy", in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Sep. 2010.
    • (2010) Proc. IEEE Inf. Theory Workshop
    • Yassaee, M.H.1    Aref, M.R.2
  • 25
    • 5144231861 scopus 로고    scopus 로고
    • On the role of MMSE estimation in approaching the information-theoretic limits of linear gaussian channels: Shannon meets Wiener
    • Monticello, IL, Oct
    • J. G. D. Forney, "On the role of MMSE estimation in approaching the information-theoretic limits of linear gaussian channels: Shannon meets Wiener", in Proc. 41st Ann. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Oct. 2003, pp. 430-439.
    • (2003) Proc. 41st Ann. Allerton Conf. Communication, Control, and Computing , pp. 430-439
    • Forney, J.G.D.1
  • 26
    • 77955354714 scopus 로고    scopus 로고
    • A new outer bound for the secrecy capacity region of the Gaussian two-way wiretap channel
    • May
    • X. He and A. Yener, "A new outer bound for the secrecy capacity region of the Gaussian two-way wiretap channel", in Proc. IEEE Int. Communications (ICC) Conf., May 2010, pp. 1-5.
    • (2010) Proc. IEEE Int. Communications (ICC) Conf. , pp. 1-5
    • He, X.1    Yener, A.2
  • 29
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels", IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.E.3
  • 30
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun, Shitz
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.