DocumentCode :
2079834
Title :
Secret communication using sources and channels
Author :
Eswaran, Krishnan ; Prabhakaran, Vinod M. ; Ramchandran, Kannan
Author_Institution :
Dept. of EECS, Univ. of California, Berkeley, Berkeley, CA
fYear :
2008
fDate :
26-29 Oct. 2008
Firstpage :
671
Lastpage :
675
Abstract :
Alice wants to send Bob a secret message in the presence of an eavesdropper Eve. Alice has two resources available: a noisy broadcast channel and source observations correlated with observations at Bob and Eve. We consider two cases, the first in which the source observations and channel are independent and the second in which they can depend on each other. For the independent case, we consider a strategy that exploits the sources and channels separately and show this separation strategy is optimal for a class of sources and channels that includes a Gaussian example. For the case in which the sources and channels depend on each other, this separation strategy does not work, and an optimal strategy has yet to be established. For this setting, we improve on the best known upper bound to the secret message capacity.
Keywords :
cryptography; message authentication; telecommunication security; Gaussian example; secret communication; secret message; Availability; Broadcasting; Character generation; Context; Degradation; Noise generators; Random variables; Upper bound;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signals, Systems and Computers, 2008 42nd Asilomar Conference on
Conference_Location :
Pacific Grove, CA
ISSN :
1058-6393
Print_ISBN :
978-1-4244-2940-0
Electronic_ISBN :
1058-6393
Type :
conf
DOI :
10.1109/ACSSC.2008.5074492
Filename :
5074492
Link To Document :
بازگشت