### Abstract

This paper studies secrecy capacity in a semi-deterministic setting, in which the channel between legitimate users (called Alice and Bob) is deterministic, while that between Alice and the eavesdropper (called Eve) is a discrete memoryless channel. Such a model is particularly relevant when a pre-existing error correcting code tailored to the legitimate channel is in use on top of which secret information is to be shared. First, a point-to-point setting is considered with a single wire-tapper, a situation in which the secrecy capacity has an elegant characterization. Next, a generalized multiple access setting with confidential messages is considered in which each user wishes to communicate secret information to a common destination without the other determining its message. In this latter situation, outer bounds on the secrecy capacity are obtained.

Original language | English (US) |
---|---|

Title of host publication | Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW |

Pages | 199-202 |

Number of pages | 4 |

DOIs | |

State | Published - Dec 1 2007 |

Event | 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW - Solstrand, Norway Duration: Jul 1 2007 → Jul 6 2007 |

### Publication series

Name | Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW |
---|

### Other

Other | 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW |
---|---|

Country | Norway |

City | Solstrand |

Period | 7/1/07 → 7/6/07 |

### ASJC Scopus subject areas

- Computer Networks and Communications
- Information Systems
- Communication

## Fingerprint Dive into the research topics of 'Secrecy capacity of semi-deterministic wire-tap channels'. Together they form a unique fingerprint.

## Cite this

*Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW*(pp. 199-202). [4318063] (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW). https://doi.org/10.1109/ITWITWN.2007.4318063