메뉴 건너뛰기




Volumn 59, Issue 12, 2013, Pages 8115-8130

The role of feedback in two-way secure communications

Author keywords

Cooperative jamming; Feedback; Information theoretic security; Two way relay channel; Two way wiretap channel

Indexed keywords

ACHIEVABLE RATE REGION; COMMUNICATION RATE; COOPERATIVE JAMMING; INFORMATION- THEORETIC SECURITIES; SECRECY CAPACITY REGIONS; SECURE COMMUNICATIONS; TWO-WAY RELAY CHANNELS; WIRE-TAP CHANNELS;

EID: 84889603798     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2013.2281711     Document Type: Article
Times cited : (47)

References (30)
  • 2
    • 0021157174 scopus 로고
    • A general coding scheme for the two-way channel
    • Jan
    • T. Han, "A general coding scheme for the two-way channel," IEEE Trans. Inf. Theory, vol. 30, no. 1, pp. 35-44, Jan. 1984.
    • (1984) IEEE Trans. Inf. Theory , vol.30 , Issue.1 , pp. 35-44
    • Han, T.1
  • 3
    • 0018443950 scopus 로고
    • Capacity region of the two-Way channel can exceed the inner bound
    • G. Dueck, "The capacity region of the two-way channel can exceed the inner bound," Inf. Control., vol. 40, no. 3, pp. 258-266, 1979. (Pubitemid 9456494)
    • (1979) Inf Control , vol.40 , Issue.3 , pp. 258-266
    • Dueck Gunter1
  • 4
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Sep
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Sep. 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 7
    • 51849094090 scopus 로고    scopus 로고
    • Strictly positive secrecy rates of binary wiretapper channels using feedback schemes
    • Mar
    • G. T. Amariucai and S. Wei, "Strictly positive secrecy rates of binary wiretapper channels using feedback schemes," in Proc. 42nd Annu. Conf. Inf. Sci. Syst., Mar. 2008, pp. 624-629.
    • (2008) Proc. 42nd Annu. Conf. Inf. Sci. Syst , pp. 624-629
    • Amariucai, G.T.1    Wei, S.2
  • 9
    • 84870916633 scopus 로고    scopus 로고
    • Transmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoder
    • ser. Lecture Notes in Computer Science. Berlin, Germany: Springer
    • R. Ahlswede and N. Cai, "Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels With Secure Feedback From the Decoder," in General Theory of Information Transfer and Combinatorics, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer, 2006, vol. 4123, pp. 258-275.
    • (2006) General Theory of Information Transfer and Combinatorics , vol.4123 , pp. 258-275
    • Ahlswede, R.1    Cai, N.2
  • 11
    • 0019566096 scopus 로고
    • Achievable rate region for the multiple-Access channel with feedback
    • T. M. Cover and C. Leung, "An achievable rate region for the multipleaccess channel with feedback," IEEE Trans. Inf. Theory, vol. IT-27, no. 3, pp. 292-298, May 1981. (Pubitemid 11420459)
    • (1981) IEEE Transactions on Information Theory , vol.IT-27 , Issue.3 , pp. 292-298
    • Cover Thomas, M.1    Leung Cyril, S.2
  • 12
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 15
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3801-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3801-3827
    • He, X.1    Yener, A.2
  • 16
    • 78650894311 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jan
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 137-155
    • Ekrem, E.1    Ulukus, S.2
  • 17
    • 76649123145 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay
    • Network., Spec. Issue Wireless Phys. Layer Security, Mar. 305146
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay," Eurasip J. Wireless Commun. Network., Spec. Issue Wireless Phys. Layer Security, no. 305146, pp. 13-13, Mar. 2009.
    • (2009) Eurasip J. Wireless Commun , pp. 13-13
    • He, X.1    Yener, A.2
  • 18
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography part i.Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 19
    • 84856821725 scopus 로고    scopus 로고
    • Secret-key generation using correlated sources and channels
    • Feb
    • A. Khisti, S. Diggavi, and G. Wornell, "Secret-key generation using correlated sources and channels," IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 652-670, Feb. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.2 , pp. 652-670
    • Khisti, A.1    Diggavi, S.2    Wornell, G.3
  • 20
    • 52349084992 scopus 로고    scopus 로고
    • Secrecy via sources and channels A secret key Secret message rate tradeoff region," in Proc
    • Jul
    • V. M. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via sources and channels - A secret key - Secret message rate tradeoff region," in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2008, pp. 1010-1014.
    • (2008) IEEE Int. Symp. Inf. Theory , pp. 1010-1014
    • Prabhakaran, V.M.1    Eswaran, K.2    Ramchandran, K.3
  • 21
    • 77954570193 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals Part II: Channel model
    • Aug
    • A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals - Part II: Channel model," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3997-4010, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3997-4010
    • Gohari, A.A.1    Anantharam, V.2
  • 22
    • 70449515425 scopus 로고    scopus 로고
    • Secrecy generation for multiple input multiple output channelmodels
    • Jun
    • I. Csiszár and P. Narayan, "Secrecy generation for multiple input multiple output channelmodels," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 2447-2451.
    • (2009) Proc IEEE Int. Symp. Inf. Theory , pp. 2447-2451
    • Csiszár, I.1    Narayan, P.2
  • 23
    • 40949121595 scopus 로고    scopus 로고
    • Achievable rates for two-way wire-tap channels
    • Jun
    • E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 941-945.
    • (2007) Proc IEEE Int. Symp. Inf. Theory , pp. 941-945
    • Tekin, E.1    Yener, A.2
  • 24
    • 51849134999 scopus 로고    scopus 로고
    • Confidential messages to a cooperative relay
    • May
    • M. Bloch and A. Thangraj, "Confidential messages to a cooperative relay," in Proc. IEEE Inf. Theory Workshop, May 2008, pp. 154-158.
    • (2008) Proc IEEE Inf. Theory Workshop , pp. 154-158
    • Bloch, M.1    Thangraj, A.2
  • 25
    • 70449504460 scopus 로고    scopus 로고
    • Channel scrambling for secrecy
    • Jun
    • M. Bloch, "Channel scrambling for secrecy," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 2452-2456.
    • (2009) Proc IEEE Int. Symp. Inf. Theory , pp. 2452-2456
    • Bloch, M.1
  • 26
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 27
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas- I: The MISOME Wiretap channel
    • Jul
    • A. Khisti and G. Wornell, "Secure transmission with multiple antennas- I: The MISOME Wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.2
  • 28
    • 70349678716 scopus 로고    scopus 로고
    • On the role of feedback in two way secure communication
    • Systems, Computing, Oct
    • X. He and A. Yener, "On the role of feedback in two way secure communication," in Proc. 42nd Annu. Asilomar Conf. Signals, Systems, Computing, Oct. 2008, pp. 1093-1097.
    • (2008) Proc. 42nd Annu. Asilomar Conf. Signals , pp. 1093-1097
    • He, X.1    Yener, A.2
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.