In this plenary talk we present our previous works on information theoretic security consisting of three miscellaneous topics. Those topics provide some specific but interesting problems arising inherently in communication systems with security requirement. The first topics is the relay channel with confidential messages (the RCC), which provides an interesting subject discussing an interplay between the two roles of the relay as a “helper” and as an “eavesdropper”. The second topics is the broadcast channel with confidential messages (the BCC) with randomness constraints stochastic encoders. In the BCC, we study a practical problem that we have some resource constraint on “dummy random variables” used for the stochastic encoders. The third topic is our recent work on an information theoretic analysis of the Shannon cipher system under side-channel attacks. In this topics we discuss some interesting relationship between the privacy amplification and the strong converse theorem for a certain multiterminal source coding system.
to (JST)
to (JST)
Regular Session
Information Measures and Statistics
Regular Session
LDPC Codes
Regular Session
Information Security I
to (JST)
Regular Session
Machine Learning II
Regular Session
Decoding
Regular Session
Information Security II
to (JST)
Social Event
Socializing
Photo session,
Today's lottery.
to (JST)
Regular Session
Sparse Recovery
Regular Session
Coding Theory and Practice
Regular Session
Information Security III
to (JST)
Regular Session
Coding Theory
Invited Session
Information-Theoretic Security
One of the four invited sessions at ITW2021, this session has five presentations on information-theoretic security.