메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Secure broadcasting of a common message with independent secret keys

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; SOFTWARE ENGINEERING;

EID: 84901438691     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2014.6814137     Document Type: Conference Paper
Times cited : (9)

References (25)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. J., vol. 28, no. 4, p. 656715, Oct. 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.4 , pp. 656715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The Wire-Tap Channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 8
    • 84865357022 scopus 로고    scopus 로고
    • Capacity region of gaussian mimo broadcast channels with common and confidential messages
    • Sep
    • E. Ekrem and S. Ulukus, "Capacity Region of Gaussian MIMO Broadcast Channels With Common and Confidential Messages," IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5669-5680, Sep. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.9 , pp. 5669-5680
    • Ekrem, E.1    Ulukus, S.2
  • 9
    • 84873885571 scopus 로고    scopus 로고
    • New results on multiple-input multiple-output broadcast channels with confidential messages
    • Mar
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1346-1359, Mar. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.3 , pp. 1346-1359
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai Shitz, S.4
  • 10
    • 84872345676 scopus 로고    scopus 로고
    • Strong secrecy in bidirectional broadcast channels with confidential messages
    • Feb
    • R. F. Wyrembelski, M. Wiese, and H. Boche, "Strong Secrecy in Bidirectional Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 324-334, Feb. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.2 , pp. 324-334
    • Wyrembelski, R.F.1    Wiese, M.2    Boche, H.3
  • 11
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • Mar
    • Y. Liang and H. V. Poor, "Multiple-Access Channels With Confidential Messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 13
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • Jun
    • R. Liu, I. Marić, P. Spasojević, and R. D. Yates, "Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Marić, I.2    Spasojević, P.3    Yates, R.D.4
  • 14
    • 0031143282 scopus 로고    scopus 로고
    • Rate-distortion theory for the shannon cipher system
    • May
    • H. Yamamoto, "Rate-Distortion Theory for the Shannon Cipher System," IEEE Trans. Inf. Theory, vol. 43, no. 3, pp. 827-835, May 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.3 , pp. 827-835
    • Yamamoto, H.1
  • 15
    • 45249086542 scopus 로고    scopus 로고
    • Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
    • Jun
    • N. Merhav, "Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2723-2734, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2723-2734
    • Merhav, N.1
  • 16
    • 80051921757 scopus 로고    scopus 로고
    • Wiretap channel with shared key
    • Dublin, Ireland, Aug
    • W. Kang and N. Liu, "Wiretap Channel with Shared Key," in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Aug. 2010, pp. 1-5.
    • (2010) Proc. IEEE Inf. Theory Workshop , pp. 1-5
    • Kang, W.1    Liu, N.2
  • 17
    • 84870916633 scopus 로고    scopus 로고
    • Lecture Notes in Computer Science. Springer, ch. Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels with Secure Feedback from the Decoder
    • R. Ahlswede and N. Cai, General Theory of Information Transfer and Combinatorics, Lecture Notes in Computer Science. Springer, 2006, vol. 4123, ch. Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels with Secure Feedback from the Decoder, pp. 258-275.
    • (2006) General Theory of Information Transfer and Combinatorics , vol.4123 , pp. 258-275
    • Ahlswede, R.1    Cai, N.2
  • 20
    • 0029706655 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár, "Almost Independence and Secrecy Capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
    • (1996) Probl. Pered. Inform , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1
  • 21
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Springer-Verlag, May
    • U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," in EUROCRYPT 2000, Lecture Notes in Computer Science. Springer-Verlag, May 2000, vol. 1807, pp. 351-368.
    • (2000) EUROCRYPT 2000, Lecture Notes in Computer Science , vol.1807 , pp. 351-368
    • Maurer, U.M.1    Wolf, S.2
  • 23
    • 84876274641 scopus 로고    scopus 로고
    • Secrecy results for compound wiretap channels
    • Mar
    • I. Bjelaković, H. Boche, and J. Sommerfeld, "Secrecy Results for Compound Wiretap Channels," Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
    • (2013) Probl. Inf. Transmission , vol.49 , Issue.1 , pp. 73-98
    • Bjelaković, I.1    Boche, H.2    Sommerfeld, J.3
  • 24
    • 84889587094 scopus 로고    scopus 로고
    • Strong secrecy from channel resolvability
    • Dec
    • M. R. Bloch and J. N. Laneman, "Strong Secrecy from Channel Resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8077-8098
    • Bloch, M.R.1    Laneman, J.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.