2018
DOI: 10.1109/tit.2017.2786541
|View full text |Cite
|
Sign up to set email alerts
|

A New Wiretap Channel Model and Its Strong Secrecy Capacity

Abstract: In this paper, a new wiretap channel model is proposed, where the legitimate transmitter and receiver communicate over a discrete memoryless channel. The wiretapper has perfect access to a fixed-length subset of the transmitted codeword symbols of her choosing. Additionally, she observes the remainder of the transmitted symbols through a discrete memoryless channel. This new model subsumes the classical wiretap channel and wiretap channel II with noisy main channel as its special cases. The strong secrecy capa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
27
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 25 publications
(27 citation statements)
references
References 35 publications
0
27
0
Order By: Relevance
“…During cache placement, the transmitter maps M c into X n c using stochastic encoding, i.e., wiretap coding [40]. Since the rate of M c is less than 1 − α, M c is strongly secure from the adversary who observes nα symbols of X n c [38], [39]. During the delivery phase, the transmitter sends X n d as the binary representation of M d which is of length n bits, since the delivery phase is noiseless and secure.…”
Section: ) Setting 1: the Adversary Taps Into Cache Placement Onlymentioning
confidence: 99%
See 3 more Smart Citations
“…During cache placement, the transmitter maps M c into X n c using stochastic encoding, i.e., wiretap coding [40]. Since the rate of M c is less than 1 − α, M c is strongly secure from the adversary who observes nα symbols of X n c [38], [39]. During the delivery phase, the transmitter sends X n d as the binary representation of M d which is of length n bits, since the delivery phase is noiseless and secure.…”
Section: ) Setting 1: the Adversary Taps Into Cache Placement Onlymentioning
confidence: 99%
“…The secrecy capacity for this model was identified in [38]. Reference [39] has introduced a generalized wiretap model which subsumes both the classical wiretap [40] and wiretap II [37] models as special cases. This generalized model was extended to multi-transmitter and multi-receiver networks in [41]- [43].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Proof. We first perform source resolvability with lossless reconstruction by means of "random binning" [5], [30], [31] as follows. Note that standard resolvability results [5] do not directly apply to our purposes as we require recoverability of the input from the output.…”
Section: Covertness For Dmss With Unknown Distributionmentioning
confidence: 99%