| | |
| | |
Stat |
Members: 3645 Articles: 2'501'711 Articles rated: 2609
20 April 2024 |
|
| | | |
|
Article overview
| |
|
Imperfect Secrecy in Wiretap Channel II | Fan Cheng
; Raymond W. Yeung
; Kenneth W. Shum
; | Date: |
4 Feb 2012 | Abstract: | In a point-to-point communication system which consists of a sender s, a
receiver t and a set of noiseless channels, the sender s wants to transmit a
private message to the receiver t through the channels which may be
eavesdropped by a wiretapper. The wiretapper can access any one but not more
than one set of channels. It is assumed that from each wiretap set, the
wiretapper can obtain some partial information about the private message which
is measured by the wiretapper’s equivocation. The security strategy is to
encode the message with some random key. Under these settings, we define an
achievable rate tuple in terms of the message, the key and the wiretapper’s
equivocation and prove a tight rate region of the rate tuples. | Source: | arXiv, 1202.0859 | Services: | Forum | Review | PDF | Favorites |
|
|
No review found.
Did you like this article?
Note: answers to reviews or questions about the article must be posted in the forum section.
Authors are not allowed to review their own article. They can use the forum section.
browser Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
|
| |
|
|
|
| News, job offers and information for researchers and scientists:
| |