Broadcast channels with confidential messages, with tampering : the binary symmetric case

M. Dijk, van

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

47 Downloads (Pure)

Abstract

The assumptions on which the broadcast channel with confidential messages is based are discussed. Slightly changed, more realistic assumptions lead to a new model, the broadcast channel with confidential messages, with tampering. In order to generate a secret key the legitimate users need to take a certain worst-case scenario into account such that the tampering of the enemy does no harm.
Original languageEnglish
Title of host publicationProceedings of the EIDMA Winter Meeting on Coding Theory, Information Theory and Cryptology (Veldhoven, The Netherlands, December 19-21, 1994)
EditorsF.M.J. Willems
Place of PublicationEindhoven
PublisherEIDMA
Pages42
ISBN (Print)90-75332-01-7
Publication statusPublished - 1994

Fingerprint

Dive into the research topics of 'Broadcast channels with confidential messages, with tampering : the binary symmetric case'. Together they form a unique fingerprint.

Cite this