Commit eace9bd9 authored by Charlotte's avatar Charlotte
Browse files

presentation

parent 89593f21
......@@ -19,10 +19,8 @@
number = {8},
pages = {1355-1387},
volume = {54},
abstract = {We consider the situation in which digital data is to be reliably transmitted over a discrete, memoryless channel (DMC) that is subjected to a wire-tap at the receiver. We assume that the wire-tapper views the channel output via a second DMC. Encoding by the transmitter and decoding by the receiver are permitted. However, the code books used in these operations are assumed to be known by the wire-tapper. The designer attempts to build the encoder-decoder in such a way as to maximize the transmission rate R, and the equivocation d of the data as seen by the wire-tapper. In this paper, we find the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission. In particular, if d is equal to H s, the entropy of the data source, then we consider that the transmission is accomplished in perfect secrecy. Our results imply that there exists a C8 > 0, such that reliable transmission at rates up to CS is possible in approximately perfect secrecy.},
doi = {https://doi.org/10.1002/j.1538-7305.1975.tb02040.x},
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1002/j.1538-7305.1975.tb02040.x},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1002/j.1538-7305.1975.tb02040.x},
}
@InProceedings{Bellare2012,
......@@ -37,8 +35,7 @@ year="2012",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="294--311",
abstract="The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to adversary is ``noisier'' than the channel from sender to receiver. It has developed in the Information and Coding (I{\&}C) community over the last 30 years largely divorced from the parallel development of modern cryptography. This paper aims to bridge the gap with a cryptographic treatment involving advances on two fronts, namely definitions and schemes. On the first front (definitions), we explain that the mis-r definition in current use is weak and propose two alternatives: mis (based on mutual information) and ss (based on the classical notion of semantic security). We prove them equivalent, thereby connecting two fundamentally different ways of defining privacy and providing a new, strong and well-founded target for constructions. On the second front (schemes), we provide the first explicit scheme with all the following characteristics: it is proven to achieve both security (ss and mis, not just mis-r) and decodability; it has optimal rate; and both the encryption and decryption algorithms are proven to be polynomial-time.",
isbn="978-3-642-32009-5"
isbn="978-3-642-32009-5",
}
@Article{Thangaraj2007,
......
......@@ -27,6 +27,7 @@
% Literatur
\usepackage[citestyle=authoryear,bibstyle=numeric,hyperref,backend=biber]{biblatex}
\renewcommand*{\bibfont}{\small}
\addbibresource{../paper/mybib.bib}
%\addbibresource{mybib.bib}
%\addbibresource{presentation.bib}
......@@ -154,7 +155,7 @@
\begin{align}
%d_{max}=\Delta = \frac{1}{K} H(S^K|Z^N)\\
\bar{R}=\{(R,d): 0\leq R\leq C_M;~ 0\leq d\leq H_s;~ Rd\leq H_s\Gamma(R)\}\label{eq:def:Rd}\\
\text{mit }\Gamma (R)= \max_{p(x)} I(x;y)-I(x;z)
\text{mit }\Gamma (R)= \max_{p(x)} I(x;y|z)=\max_{p(x)} I(x;y)-I(x;z)
\end{align}
$p(x)$ bezeichnet hier die W'keit, dass das Symbol $X$ von der Quelle gesendet wird.
\end{block}
......@@ -187,7 +188,8 @@ $p(x)$ bezeichnet hier die W'keit, dass das Symbol $X$ von der Quelle gesendet w
\begin{figure}
\centering
\includegraphics[width=1\linewidth]{../python/visGamma}
% \label{fig:visgamma}
% \label{fig:visgamma}
\caption{Beispiel: BECs mit $\epsilon_{M}=0.1$ und $\epsilon_{MW}=0.46$}
\end{figure}
\end{columns}
......@@ -458,7 +460,9 @@ $p(x)$ bezeichnet hier die W'keit, dass das Symbol $X$ von der Quelle gesendet w
\item[$-$] \textbf{Kanalkapazität:}\\
Eine Geheimhaltung funktioniert nur, wenn der Gesamtkanal des Abhörers schlechter ist als der Hauptkanal
\end{enumerate}
\end{block}
\end{block}
%\nocite{*}
\end{frame}
%\section{Physical Layer Security}
......@@ -532,7 +536,6 @@ $p(x)$ bezeichnet hier die W'keit, dass das Symbol $X$ von der Quelle gesendet w
%\begin{exampleblock}{Backup-Teil}
% Folien, die nach \texttt{\textbackslash beginbackup} eingefügt werden, zählen nicht in die Gesamtzahl der Folien.
%\end{exampleblock}
\printbibliography
\end{frame}
......
This diff is collapsed.
This diff is collapsed.
python/visGamma.png

28.7 KB | W: | H:

python/visGamma.png

28.2 KB | W: | H:

python/visGamma.png
python/visGamma.png
python/visGamma.png
python/visGamma.png
  • 2-up
  • Swipe
  • Onion skin
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment