We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Information Theory

Title: Correlated Source Coded Sequences with Compromised Channel and Source Symbols using Shannon's Cipher System

Abstract: Correlated sources are present in communication systems where protocols ensure that there is some predetermined information for sources to transmit. Here, two correlated sources across a channel with eavesdroppers are investigated, and conditions for perfect secrecy when some channel information and some source data symbols (the predetermined information) have been wiretapped are determined. The adversary in this situation has access to more information than if a link is wiretapped only and can thus determine more about a particular source. This scenario caters for an application where the eavesdropper has access to some preexisting information. We provide bounds for the channel and key rates for this scenario. Further, we provide a method to reduce the key lengths required for perfect secrecy.
Comments: arXiv admin note: substantial text overlap with arXiv:1401.6264
Subjects: Information Theory (cs.IT)
Cite as: arXiv:1410.8805 [cs.IT]
  (or arXiv:1410.8805v2 [cs.IT] for this version)

Submission history

From: Reevana Balmahoon [view email]
[v1] Fri, 31 Oct 2014 16:49:09 GMT (281kb,D)
[v2] Wed, 5 Nov 2014 18:30:32 GMT (91kb,D)

Link back to: arXiv, form interface, contact.