메뉴 건너뛰기




Volumn 2015-June, Issue , 2015, Pages 1971-1975

How to use independent secret keys for secure broadcasting of common messages

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; INFORMATION THEORY; QUANTUM CRYPTOGRAPHY; SIGNAL RECEIVERS;

EID: 84969795533     PISSN: 21578095     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2015.7282800     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication Theory of Secrecy Systems, " Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The Wire-Tap Channel, " Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0031143282 scopus 로고    scopus 로고
    • Rate-distortion theory for the shannon cipher system
    • May
    • H. Yamamoto, "Rate-Distortion Theory for the Shannon Cipher System, " IEEE Trans. Inf. Theory, vol. 43, no. 3, pp. 827-835, May 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.3 , pp. 827-835
    • Yamamoto, H.1
  • 6
    • 45249086542 scopus 로고    scopus 로고
    • Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
    • Jun.
    • N. Merhav, "Shannon's Secrecy System with Informed Receivers and Its Application to Systematic Coding for Wiretapped Channels, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2723-2734, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2723-2734
    • Merhav, N.1
  • 7
    • 80051921757 scopus 로고    scopus 로고
    • Wiretap channel with shared key
    • Dublin, Ireland, Aug.
    • W. Kang and N. Liu, "Wiretap Channel with Shared Key, " in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Aug. 2010, pp. 1-5.
    • (2010) Proc. IEEE Inf. Theory Workshop , pp. 1-5
    • Kang, W.1    Liu, N.2
  • 8
    • 84940473770 scopus 로고    scopus 로고
    • Robust transmission over wiretap channels with secret keys
    • Pacific Grove, CA, USA, Nov.
    • R. F. Schaefer and H. V. Poor, "Robust Transmission over Wiretap Channels with Secret Keys, " in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific Grove, CA, USA, Nov. 2014, pp. 60-64.
    • (2014) Proc. Asilomar Conf. Signals, Systems, Computers , pp. 60-64
    • Schaefer, R.F.1    Poor, H.V.2
  • 9
    • 84901438691 scopus 로고    scopus 로고
    • Secure broadcasting of a common message with independent secret keys
    • Princeton, NJ, USA, Mar.
    • R. F. Schaefer and A. Khisti, "Secure Broadcasting of a Common Message with Independent Secret Keys, " in Proc. Conf. Inf. Sciences and Systems, Princeton, NJ, USA, Mar. 2014, pp. 1-6.
    • (2014) Proc. Conf. Inf. Sciences and Systems , pp. 1-6
    • Schaefer, R.F.1    Khisti, A.2
  • 11
    • 33846037665 scopus 로고    scopus 로고
    • An outer bound to the capacity region of the broadcast channel
    • Jan.
    • C. Nair and A. El Gamal, "An Outer Bound to the Capacity Region of the Broadcast Channel, " IEEE Trans. Inf. Theory, vol. 53, no. 1, pp. 350-355, Jan. 2007.
    • (2007) IEEE Trans. Inf. Theory , vol.53 , Issue.1 , pp. 350-355
    • Nair, C.1    El Gamal, A.2
  • 12
    • 0018467629 scopus 로고
    • A coding theorem for the discrete memoryless broadcast channel
    • May
    • K. Marton, "A Coding Theorem for the Discrete Memoryless Broadcast Channel, " IEEE Trans. Inf. Theory, vol. 25, no. 3, pp. 306-311, May 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.25 , Issue.3 , pp. 306-311
    • Marton, K.1
  • 13
    • 84876274641 scopus 로고    scopus 로고
    • Secrecy results for compound wiretap channels
    • Mar.
    • I. Bjelakovíc, H. Boche, and J. Sommerfeld, "Secrecy Results for Compound Wiretap Channels, " Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
    • (2013) Probl. Inf. Transmission , vol.49 , Issue.1 , pp. 73-98
    • Bjelakovíc, I.1    Boche, H.2    Sommerfeld, J.3
  • 14
    • 84889587094 scopus 로고    scopus 로고
    • Strong secrecy from channel resolvability
    • Dec.
    • M. R. Bloch and J. N. Laneman, "Strong Secrecy from Channel Resolvability, " IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8077-8098
    • Bloch, M.R.1    Laneman, J.N.2
  • 15
    • 84906555227 scopus 로고    scopus 로고
    • Effective secrecy: Reliability, confusion, and stealth
    • Honolulu, HI, USA, Jun.
    • J. Hou and G. Kramer, "Effective Secrecy: Reliability, Confusion, and Stealth, " in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jun. 2014, pp. 601-605.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 601-605
    • Hou, J.1    Kramer, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.