Paper Abstract and Keywords |
Presentation |
2005-03-18 15:30
The coding theorem for the Shannon cipher system with a guessing wiretapper and correlated sources Yutaka Hayashi, Hirosuke Yamamoto (Univ. of Tokyo) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The security of Shannon's cipher system is traditionally measured in terms of the equivocation$\frac{1}{n}H(Y|Z)$, where
$Y$ is a secert plaintext and $Z$ is its cryptogram that a wiretapper can obtain. But, Merhav and Arikan have considered the coding problem
in another security criterion, which is measured by the expected number of guesses that the wiretapper has to submit before the success. On the other hand,
in the traditional security criterion, Yamamoto has treated the coding problem with the correlated source outputs $X$ and $Y$
such that $X$ is a secret information against wiretappsers and $Y$ is a nonsecret information transmitted to a legitimate receiver.
In this paper, we extend these two results and prove the coding theorem of Yamamoto's cipher system
in Merhav-Arikan's security criterion. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
guessing wiretapper / Shannon's cipher system / correlated sources / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 104, no. 730, IT2004-86, pp. 83-88, March 2005. |
Paper # |
IT2004-86 |
Date of Issue |
2005-03-10 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
IT WBS ISEC |
Conference Date |
2005-03-17 - 2005-03-18 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kyoto Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
general |
Paper Information |
Registration To |
IT |
Conference Code |
2005-03-IT-WBS-ISEC |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
The coding theorem for the Shannon cipher system with a guessing wiretapper and correlated sources |
Sub Title (in English) |
|
Keyword(1) |
guessing wiretapper |
Keyword(2) |
Shannon's cipher system |
Keyword(3) |
correlated sources |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Yutaka Hayashi |
1st Author's Affiliation |
University of Tokyo (Univ. of Tokyo) |
2nd Author's Name |
Hirosuke Yamamoto |
2nd Author's Affiliation |
University of Tokyo (Univ. of Tokyo) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2005-03-18 15:30:00 |
Presentation Time |
25 minutes |
Registration for |
IT |
Paper # |
IT2004-86, ISEC2004-142, WBS2004-201 |
Volume (vol) |
vol.104 |
Number (no) |
no.730(IT), no.732(ISEC), no.734(WBS) |
Page |
pp.83-88 |
#Pages |
6 |
Date of Issue |
2005-03-10 (IT, ISEC, WBS) |
|