Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 553
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorSong, Won Taekko
dc.contributor.authorChoi, Jinhoko
dc.contributor.authorHa, Jeongseokko
dc.date.accessioned2013-03-12T10:53:22Z-
dc.date.available2013-03-12T10:53:22Z-
dc.date.created2012-08-22-
dc.date.created2012-08-22-
dc.date.issued2012-08-
dc.identifier.citationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.7, no.4, pp.1414 - 1418-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10203/102078-
dc.description.abstractWe introduce a binary erasure wiretap channel of type II in which the number of eavesdropped bits mu becomes available a posteriori. We aim at achieving perfect secrecy over such a channel model. The most appropriate application is a secret key agreement scheme. We present a secret key agreement scheme that adopts the formulation S = HX of Wyner-Ozarows's linear coset coding. The scheme is based on the following simple observation: even if some information on a secret message S leaked out, I(S; X-mu) > 0, where X-mu is a binary sequence of length mu, it is still possible to have perfect secrecy I(S-J; X-mu) for some subsequence S-J of S. Our secret key agreement scheme achieves perfect secrecy by taking only those subsequences S-J that are independent of the eavesdropped bits X-mu. Our secret key agreement scheme naturally leads to defining a security measure D-H(mu) for parity-check matrices H such that the eavesdropper gets zero information on S-J as long as the length of S-J is less than D-H(mu). We study basic properties of D-H(mu) and prove the perfect secrecy of our key agreement scheme. For parity-check matrices of small sizes, we perform an exhaustive search for matrices maximizing D-H(mu).-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectKEY AGREEMENT-
dc.subjectPOLAR CODES-
dc.subjectTAP CHANNEL-
dc.subjectCRYPTOGRAPHY-
dc.subjectINFORMATION-
dc.titlePerfect Secrecy Over Binary Erasure Wiretap Channel of Type II-
dc.typeArticle-
dc.identifier.wosid000306520900026-
dc.identifier.scopusid2-s2.0-84863959227-
dc.type.rimsART-
dc.citation.volume7-
dc.citation.issue4-
dc.citation.beginningpage1414-
dc.citation.endingpage1418-
dc.citation.publicationnameIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.identifier.doi10.1109/TIFS.2012.2199629-
dc.contributor.localauthorHa, Jeongseok-
dc.contributor.nonIdAuthorSong, Won Taek-
dc.contributor.nonIdAuthorChoi, Jinho-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCoset code-
dc.subject.keywordAuthorkey rate-
dc.subject.keywordAuthorsecurity measure-
dc.subject.keywordAuthorwiretap channel-
dc.subject.keywordPlusKEY AGREEMENT-
dc.subject.keywordPlusPOLAR CODES-
dc.subject.keywordPlusTAP CHANNEL-
dc.subject.keywordPlusCRYPTOGRAPHY-
dc.subject.keywordPlusINFORMATION-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0