2016
DOI: 10.1109/tit.2016.2565482
|View full text |Cite
|
Sign up to set email alerts
|

A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria

Abstract: We give a complete characterization of the correlated random coding secrecy capacity of arbitrarily varying wiretap channels (AVWCs). We apply two alternative strong secrecy criteria, which both lead to the same multi-letter formula. The difference of these criteria lies in the treatment of correlated randomness, they coincide in the case of uncorrelated codes. On the basis of the derived formula, we show that the correlated random coding secrecy capacity is continuous as a function of the AVWC, in contrast to… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
84
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 53 publications
(87 citation statements)
references
References 24 publications
(71 reference statements)
3
84
0
Order By: Relevance
“…Our idea is similar to the results for classical arbitrarily varying wiretap channel in [39]: Applying Ahlswede's robustification technique (cf. [13]), we use the results of Section 3 to show the existence of a common randomness assisted quantum code.…”
Section: Proof I) Achievementmentioning
confidence: 89%
See 3 more Smart Citations
“…Our idea is similar to the results for classical arbitrarily varying wiretap channel in [39]: Applying Ahlswede's robustification technique (cf. [13]), we use the results of Section 3 to show the existence of a common randomness assisted quantum code.…”
Section: Proof I) Achievementmentioning
confidence: 89%
“…Similar to the results for classical arbitrarily varying wiretap channel in [39], we limit the amount of common randomness.…”
Section: Ii) Conversementioning
confidence: 90%
See 2 more Smart Citations
“…A great deal of research work addressed how to improve secrecy performance, some from the perspective of precoding and beamforming [7][8][9][10], some via the utilization of artificial noise or jamming [11][12][13][14], and some jointly applying these approaches [15][16][17][18]. Overall, the purpose of exploiting these techniques is to enlarge the capacity difference between main and eavesdropper channels.…”
Section: Introductionmentioning
confidence: 99%