메뉴 건너뛰기




Volumn , Issue , 2011, Pages 633-637

Achieving secrecy: Capacity vs. resolvability

Author keywords

[No Author keywords available]

Indexed keywords

CODING MECHANISM; CONFIDENTIAL MESSAGE; SECRECY CAPACITY; WIRETAP CHANNEL;

EID: 80054802506     PISSN: 21578104     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2011.6034207     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 1
    • 80054796327 scopus 로고    scopus 로고
    • Secrecy from resolvability
    • submitted to, November, Online. Available: arXiv:1105.5419
    • M. R. Bloch and J. N. Laneman, "Secrecy from Resolvability", submitted to IEEE Transactions on Information Theory, November 2011. [Online]. Available: arXiv:1105.5419
    • (2011) IEEE Transactions on Information Theory
    • Bloch, M.R.1    Laneman, J.N.2
  • 3
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Lecture Notes in Computer Science. B. Preneel
    • U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free", in Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science. B. Preneel, 2000, p. 351.
    • (2000) Advances in Cryptology - Eurocrypt 2000 , pp. 351
    • Maurer, U.M.1    Wolf, S.2
  • 4
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • January-March
    • I. Csiszár, "Almost Independence and Secrecy Capacity", Problems of Information Transmission, vol. 32, no. 1, pp. 40-47, January-March 1996.
    • (1996) Problems of Information Transmission , vol.32 , Issue.1 , pp. 40-47
    • Csiszár, I.1
  • 6
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages", IEEE Trans. on Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. on Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 7
    • 0016562514 scopus 로고
    • The wire-tap channel
    • October
    • A. D. Wyner, "The Wire-Tap Channel", Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 8
    • 77955673446 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • July, submitted to, Online. Available: arXiv:1007.3568v1
    • H. Mahdavifar and A. Vardy, "Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes", July 2010, submitted to IEEE Trans. Inf. Theory. [Online]. Available: arXiv:1007.3568v1
    • (2010) IEEE Trans. Inf. Theory
    • Mahdavifar, H.1    Vardy, A.2
  • 10
    • 0027602480 scopus 로고
    • Approximation theory of output statistics
    • May
    • T. Han and S. Verdú, "Approximation Theory of Output Statistics", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 752-772
    • Han, T.1    Verdú, S.2
  • 11
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
    • April
    • M. Hayashi, "General Nonasymptotic and Asymptotic Formulas in Channel Resolvability and Identification Capacity and their Application to the Wiretap Channels", IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, April 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 12
    • 80054800559 scopus 로고    scopus 로고
    • Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels
    • Cachan, France, May, invited
    • L. Luzzi and M. R. Bloch, "Capacity-based random codes cannot achieve strong secrecy over symmetric wiretap channels", in Proc. of 1st. International Workshop on Secure Wireless Networks, Cachan, France, May 2011, (invited).
    • (2011) Proc. of 1st. International Workshop on Secure Wireless Networks
    • Luzzi, L.1    Bloch, M.R.2
  • 13
    • 54749144274 scopus 로고    scopus 로고
    • Second-order asymptotics in fixed-length source coding and intrinsic randomness
    • October
    • M. Hayashi, "Second-Order Asymptotics in Fixed-Length Source Coding and Intrinsic Randomness", IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4619-4637, October 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4619-4637
    • Hayashi, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.