Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-fbnjt Total loading time: 0 Render date: 2024-11-06T05:04:25.106Z Has data issue: false hasContentIssue false

1 - Effective Secrecy: Reliability, Confusion, and Stealth

from Part I - Theoretical Foundations

Published online by Cambridge University Press:  28 June 2017

J. Hou
Affiliation:
European Patent Office Munich
G. Kramer
Affiliation:
Chair of Communications Engineering, Technische Universität München
M. Bloch
Affiliation:
School of Electrical and Computer Engineering, Georgia Institute of Technology
Rafael F. Schaefer
Affiliation:
Technische Universität Berlin
Holger Boche
Affiliation:
Technische Universität München
Ashish Khisti
Affiliation:
University of Toronto
H. Vincent Poor
Affiliation:
Princeton University, New Jersey
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] A. D., Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975.Google Scholar
[2] I., Csiszár and J., Körner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.Google Scholar
[3] U. M., Maurer and S., Wolf, “Information-theoretic key agreement: From weak to strong secrecy for free,” Lecture Notes in Computer Science, vol. 1807, pp. 351–368, 2000.Google Scholar
[4] I., Csiszár, “Almost independence and secrecy capacity,” Probl. Pered. Inform., vol. 32, no. 1, pp. 48–57, 1996.Google Scholar
[5] T. S., Han and S., Verdú, “Approximation theory of output statistics,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752–772, May 1993.Google Scholar
[6] M., Hayashi, “General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562–1575, Apr. 2006.Google Scholar
[7] M. R., Bloch and J. N., Laneman, “Strong secrecy from channel resolvability,” IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077–8098, Dec. 2013.Google Scholar
[8] J., Hou and G., Kramer, “Informational divergence approximations to product distributions,” in Proc. Canadian Workshop Inf. Theory, Toronto, ON, Canada, Jun. 2013, pp. 76–81.
[9] A., Winter, “Secret, public and quantum correlation cost of triples of random variables,” in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2270–2274.
[10] J., Hou and G., Kramer, “Effective secrecy: Reliability, confusion and stealth,” Nov. 2013. [Online]. Available: http://arxiv.org/abs/1311.1411
[11] T. S., Han, H., Endo, and M., Sasaki, “Reliability and secrecy functions of the wiretap channel under cost constraint,” Jul. 2013. [Online]. Available: http://arxiv.org/abs/1307.0608
[12] T. S., Han, H., Endo, and M., Sasaki, “Reliability and secrecy functions of the wiretap channel under cost constraint,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562–1575, Apr. 2015.Google Scholar
[13] Committee on National Security Systems, “Committee on National Security Systems (CNSS) Glossary,” Tech. Rep., Apr. 2015, CNSSI 4009. [Online]. Available: www.cnss.gov
[14] G. E., Prescott, “Performance metrics for low probability of intercept communication systems,” Air Force Office of Scientific Research, Bolling AFB, Washington DC, Tech. Rep., Oct. 1993, grant AFOSR-91-0018.
[15] D. L., Nicholson, Spread Spectrum Signal Design: LPE and AJ Systems. Rockville, MD: Computer Science Press, 1988.
[16] B., Bash, D., Goeckel, and D., Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.Google Scholar
[17] P. H., Che, M., Bakshi, and S., Jaggi, “Reliable deniable communcation: Hiding messages in noise,” in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013, pp. 2945–2949.
[18] S., Lee, R., Baxley, M., Weitnauer, and B., Walkenhorst, “Achieving undetectable communication,” IEEE J. Sel. Topics Signal Proc., vol. 9, no. 7, pp. 1195–1205, Oct. 2015.Google Scholar
[19] L., Wang, G. W., Wornell, and L., Zheng, “Fundamental limits of communication with low probability of detection,” IEEE Trans. Inf. Theory, vol. 62, no. 6, pp. 3493–3503, June 2016.Google Scholar
[20] M. R., Bloch, “Covert communication over noisy channels: A resolvability perspective,” IEEE Trans. Inf. Theory, vol. 62, no. 5, pp. 2334–2354, May 2016.Google Scholar
[21] J. L., Massey, Applied Digital Information Theory, ETH Zurich, Zurich, Switzerland, 1980–1998.
[22] A., Orlitsky and J. R., Roche, “Coding for computing,” IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 903–917, Mar. 2001.Google Scholar
[23] S., Watanabe and Y., Oohama, “The optimal use of rate-limited randomness in broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 61, no. 2, pp. 983–995, Feb. 2015.Google Scholar
[24] G., Kramer, “Teaching IT: An identity for the Gelfand-Pinsker converse,” IEEE Inf. Theory Society Newsletter, vol. 61, no. 4, pp. 4–6, Dec. 2011.Google Scholar
[25] J., Hou, “Coding for relay networks and effective secrecy for wire-tap channels,” Ph.D. dissertation, Technische Universität München, Munich, Germany, 2014.
[26] A. El, Gamal and Y.-H., Kim, Network Information Theory. Cambridge: Cambridge University Press, 2011.
[27] E. L., Lehmann and J. P., Romano, Testing Statistical Hypotheses, 3rd edn. New York: Springer, 2005.
[28] T. M., Cover and J. A., Thomas, Elements of Information Theory, 2nd edn. Chichester:Wiley & Sons, 2006.

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×