The assumptions on which the broadcast channel with confidential messages is based are discussed. Slightly changed, more realistic assumptions lead to a new model, the broadcast channel with confidential messages, with tampering. In order to generate a secret key the legitimate users need to take a certain worst-case scenario into account such that the tampering of the enemy does no harm.
|Title of host publication||Proceedings of the EIDMA Winter Meeting on Coding Theory, Information Theory and Cryptology (Veldhoven, The Netherlands, December 19-21, 1994)|
|Place of Publication||Eindhoven|
|Publication status||Published - 1994|