메뉴 건너뛰기




Volumn 58, Issue 11, 2012, Pages 6747-6765

Secrecy via sources and channels

Author keywords

Channel with state; information theoretic security; secret key agreement; secret message communication; wiretap channel

Indexed keywords

ADDITIVE GAUSSIAN CHANNEL; BROADCAST CHANNELS; CHANNEL WITH STATE; CORRELATED SOURCES; GAUSSIAN SOURCES; INFORMATION-THEORETIC SECURITY; OPTIMALITY; PARALLEL CHANNEL; SECRET KEY; SECRET MESSAGES; SUBCHANNELS; WIRETAP CHANNEL;

EID: 84867977516     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2012.2208579     Document Type: Article
Times cited : (39)

References (17)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 2
    • 0015287303 scopus 로고
    • Broadcast channels
    • Jan
    • T. Cover, "Broadcast channels," IEEE Trans. Inf. Theory, vol. IT-18, no. 1, pp. 2-14, Jan. 1972.
    • (1972) IEEE Trans. Inf. Theory , vol.IT-18 , Issue.1 , pp. 2-14
    • Cover, T.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 5
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 6
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • DOI 10.1109/18.825796
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 8
    • 38349115043 scopus 로고    scopus 로고
    • Wiretap channel with side information
    • Jan
    • Y. Chen and A. HanVinck, "Wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 395-402, Jan. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.1 , pp. 395-402
    • Chen, Y.1    Hanvinck, A.2
  • 9
    • 80051780323 scopus 로고    scopus 로고
    • Secret-key agreement with channel state information at the transmitter
    • Sep
    • A. Khisti, S. Diggavi, and G. Wornell, "Secret-key agreement with channel state information at the transmitter," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 672-681, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 672-681
    • Khisti, A.1    Diggavi, S.2    Wornell, G.3
  • 10
    • 84856821725 scopus 로고    scopus 로고
    • Secret-key generation using correlated sources and channels
    • Feb
    • A. Khisti, S. Diggavi, and G. Wornell, "Secret-key generation using correlated sources and channels," IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 652-670, Feb. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.2 , pp. 652-670
    • Khisti, A.1    Diggavi, S.2    Wornell, G.3
  • 11
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • New York: Springer Verlag
    • U. Maurer and S. Wolf, Information-theoretic key agreement: From Weak to Strong Secrecy for Free, ser. Lecture Notes in Computer Science. New York: Springer-Verlag, 2000, pp. 351-368.
    • (2000) Ser. Lecture Notes in Computer Science , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 15
    • 84867976707 scopus 로고    scopus 로고
    • Secrecy via sources and channels: Secure transmission of an independent source with decoder side information
    • presented at the, Monticello, IL, Sep.
    • K. Eswaran and K. Ramchandran, "Secrecy via sources and channels: Secure transmission of an independent source with decoder side information," presented at the 46th Annu.Allerton Conf. Commun., Control Comput., Monticello, IL, Sep. 2008.
    • (2008) 46th Annu.Allerton Conf. Commun., Control Comput.
    • Eswaran, K.1    Ramchandran, K.2
  • 16
    • 33646073724 scopus 로고    scopus 로고
    • An achievable region for the Gaussian wiretap channel with side information
    • May
    • C. Mitrpant, H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.5 , pp. 2181-2190
    • Mitrpant, C.1    Vinck, H.2    Luo, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.