Coding theorem for secret sharing communication systems with two noisy channels

نویسنده

  • Hirosuke Yamamoto
چکیده

The coding theorem is proved for the secret sharing communication system (SSCS) with two noisy channels, each of which is a broadcast channel characterized by P( y,z, Ix,), j = 1,2; it is assumed that the legitimate channel ( Xj + Y,) is less noisy than the wiretapped channel ( Xj --f Z,), The code (f, +) for the SSCS is defined by two mappings: (Xp,Xp)=f(SK,T) and s^=q5(Yp,YaNz) where 7’ is an arbitrarily chosen random number and S is an independent identically distributed source output that must be transmitted to the legitimate receiver with an arbitrarily small error. The rate of each channel is given by N,/K while the security level for each wiretapper can be evaluated by (l/K)H(.SKIZ,~). The admissible region of rates and security levels is given by a “single-letter characterization.” BCC 1 S” t Source Encoder Decoder S-f @ es Legitimate BCC2 4 Receiver VP ZP Wi retapper2 Fig. 1. SSCS with two noisy channels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A coding theorem for secret sharing communication systems with two Gaussian wiretap channels

A coding theorem is proved for the secret sharing communication system (SSCS) with two Gaussian wiretap channels. This communication system is an extension of both the SSCS with two noiseless channels and the Gaussian wiretap channel (GWC). The admissible region of rates and security levels for the SSCS with two GWC’s is described by the capacities and secrecy capacities of two GWC’s.

متن کامل

Secret Sharing Through Noisy Quantum Channels

In a realistic situation, the secret sharing of classical or quantum information will involve the transmission of this information through noisy channels. We consider a three qubit pure state. This state becomes a mixed-state when the qubits are distributed over noisy channels. In the case of a specific noisy channel, the phase-damping channel, we show that the secret sharing of classical infor...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

On secret sharing communication systems with two or three channels

permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. 387 Ahsfruct-The source coding problem is considered for secret sharing communication systems (SSCs's) with two or three chann...

متن کامل

Stegosystems Based on Noisy Channels

Resumen We propose a significant deviation from the standard steganography problem formulation. Here, an attacker is able to receive a stegosignal only over noisy channels. There may be also situations in which the presence of a noisy channel is simulated by a designer of the stegosystem to hide secret messages. Two models of noisy channels are considered: binary symmetric channel (BSC) and add...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Information Theory

دوره 35  شماره 

صفحات  -

تاریخ انتشار 1989