Information theoretic security

Yingbin Liang, H. Vincent Poor, Shlomo Shamai

Research output: Contribution to journalArticlepeer-review

607 Scopus citations

Abstract

The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tap channel model is considered first, and then several specific types of wire-tap channels are considered, including Gaussian, multi-input multi-output (MIMO), compound, and feedback wire-tap channels, as well as the wire-tap channel with side information. Practical code design techniques to achieve secrecy for wire-tap channels are also introduced. The wire-tap formalism is then extended to the basic channels of multi-user networks, including broadcast channels, multiple-access channels (MACs), interference channels, relay channels and two-way channels. For all of these models, results on the fundamental communication limits under secrecy constraints and corresponding coding schemes are reviewed. Furthermore, several related topics including key agreement through common randomness, secure network coding, authentication, cross-layer design, and secure source coding are discussed.

Original languageEnglish (US)
Pages (from-to)355-580
Number of pages226
JournalFoundations and Trends in Communications and Information Theory
Volume5
Issue number4-5
DOIs
StatePublished - 2008

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Information theoretic security'. Together they form a unique fingerprint.

Cite this