Abstract
The assumptions on which the broadcast channel with confidential messages is based are discussed. Slightly changed, more realistic assumptions lead to a new model, the broadcast channel with confidential messages, with tampering. In order to generate a secret key the legitimate users need to take a certain worst-case scenario into account such that the tampering of the enemy does no harm.
Original language | English |
---|---|
Title of host publication | Proceedings of the EIDMA Winter Meeting on Coding Theory, Information Theory and Cryptology (Veldhoven, The Netherlands, December 19-21, 1994) |
Editors | F.M.J. Willems |
Place of Publication | Eindhoven |
Publisher | EIDMA |
Pages | 42 |
ISBN (Print) | 90-75332-01-7 |
Publication status | Published - 1994 |