Papers
Topics
Authors
Recent
Search
2000 character limit reached

Using a Secret Key to Foil an Eavesdropper

Published 19 Mar 2011 in cs.CR, cs.IT, and math.IT | (1103.3746v2)

Abstract: This work addresses private communication with distributed systems in mind. We consider how to best use secret key resources and communication to transmit signals across a system so that an eavesdropper is least capable to act on the signals. One of the key assumptions is that the private signals are publicly available with a delay---in this case a delay of one. We find that even if the source signal (information source) is memoryless, the design and performance of the optimal system has a strong dependence on which signals are assumed to be available to the eavesdropper with delay. Specifically, we consider a distributed system with two components where information is known to only one component and communication resources are limited. Instead of measuring secrecy by "equivocation," we define a value function for the system, based on the actions of the system and the adversary, and characterize the optimal performance of the system, as measured by the average value obtained against the worst adversary. The resulting optimal rate-payoff region is expressed with information theoretic inequalities, and the optimal communication methods are not standard source coding techniques but instead are methods that stem from synthesizing a memoryless channel.

Citations (19)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.