Elements of information theory
Elements of information theory
Information Theory: Coding Theorems for Discrete Memoryless Systems
Information Theory: Coding Theorems for Discrete Memoryless Systems
Authentication over noisy channels
IEEE Transactions on Information Theory
Wiretap channel type II with an active eavesdropper
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Hi-index | 0.00 |
We investigate the effect of certain active attacks on the secrecy capacity of wiretap channels by considering arbitrarily varying wiretap channels. We establish a lower bound for the secrecy capacity with randomized coding of a class of such channels and an upper bound for that of all such channels. We show that if the arbitrarily varying wiretap channel possesses a bad "averaged" state, namely one in which the legitimate receiver is degraded with respect to the eavesdropper, then secure communication is not possible.