The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Wyner의 도청 채널 모델에서 정보 유출은 일반적으로 비밀 메시지와 도청자가 수신한 신호 간의 상호 정보로 정의됩니다. 우리는 도청자가 자신의 수신 신호에서 얻는 정보의 양을 나타내는 '도청자의 수신 신호에 따른 조건부 정보 유출'이라는 수량을 새로 정의합니다. 이 수량을 도입하면 코드 길이가 선형적으로 복잡해지는 조건부 정보 누출을 계산하기 위한 빠른 알고리즘을 개발할 수 있다는 이점이 있습니다. n, 일반적인 정보 유출을 계산하는 복잡성은 기하급수적으로 증가합니다. n. 이러한 조건부 정보 유출의 보안 기준으로서의 타당성은 바이너리 대칭 채널과 바이너리 삭제 채널의 사례를 연구함으로써 확인된다.
Yutaka JITSUMATSU
Kyushu University
Ukyo MICHIWAKI
NTT DOCOMO, INC.
Yasutada OOHAMA
The University of Electro-Communications
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Yutaka JITSUMATSU, Ukyo MICHIWAKI, Yasutada OOHAMA, "Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels" in IEICE TRANSACTIONS on Fundamentals,
vol. E104-A, no. 1, pp. 295-304, January 2021, doi: 10.1587/transfun.2020EAP1017.
Abstract: Information leakage in Wyner's wiretap channel model is usually defined as the mutual information between the secret message and the eavesdropper's received signal. We define a new quantity called “conditional information leakage given the eavesdropper's received signals,” which expresses the amount of information that an eavesdropper gains from his/her received signal. A benefit of introducing this quantity is that we can develop a fast algorithm for computing the conditional information leakage, which has linear complexity in the code length n, while the complexity for computing the usual information leakage is exponential in n. Validity of such a conditional information leakage as a security criterion is confirmed by studying the cases of binary symmetric channels and binary erasure channels.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2020EAP1017/_p
부
@ARTICLE{e104-a_1_295,
author={Yutaka JITSUMATSU, Ukyo MICHIWAKI, Yasutada OOHAMA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels},
year={2021},
volume={E104-A},
number={1},
pages={295-304},
abstract={Information leakage in Wyner's wiretap channel model is usually defined as the mutual information between the secret message and the eavesdropper's received signal. We define a new quantity called “conditional information leakage given the eavesdropper's received signals,” which expresses the amount of information that an eavesdropper gains from his/her received signal. A benefit of introducing this quantity is that we can develop a fast algorithm for computing the conditional information leakage, which has linear complexity in the code length n, while the complexity for computing the usual information leakage is exponential in n. Validity of such a conditional information leakage as a security criterion is confirmed by studying the cases of binary symmetric channels and binary erasure channels.},
keywords={},
doi={10.1587/transfun.2020EAP1017},
ISSN={1745-1337},
month={January},}
부
TY - JOUR
TI - Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 295
EP - 304
AU - Yutaka JITSUMATSU
AU - Ukyo MICHIWAKI
AU - Yasutada OOHAMA
PY - 2021
DO - 10.1587/transfun.2020EAP1017
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E104-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2021
AB - Information leakage in Wyner's wiretap channel model is usually defined as the mutual information between the secret message and the eavesdropper's received signal. We define a new quantity called “conditional information leakage given the eavesdropper's received signals,” which expresses the amount of information that an eavesdropper gains from his/her received signal. A benefit of introducing this quantity is that we can develop a fast algorithm for computing the conditional information leakage, which has linear complexity in the code length n, while the complexity for computing the usual information leakage is exponential in n. Validity of such a conditional information leakage as a security criterion is confirmed by studying the cases of binary symmetric channels and binary erasure channels.
ER -