@inproceedings{0dc84555f2a74bac9ea15f8ed79f5546,
title = "The shannon cipher system with a guessing eavesdropper",
abstract = "We consider a Shannon cipher system in which distortion is allowed at the legitimate receiver. The secrecy metric used is the exponent of the probability that the reconstruction of the source sequence by the eavesdropper is within a distortion level. A single-letter characterization is provided when the message rate is large enough. Under the optimal code, the eavesdropper can do no better than either making a reconstruction blindly or guessing the key first and then reconstructing based on the sequence reconstructed by the legitimate receiver.",
author = "Lanqing Yu and Paul Cuff",
note = "Publisher Copyright: {\textcopyright} 2017 IEEE.; 2017 IEEE International Symposium on Information Theory, ISIT 2017 ; Conference date: 25-06-2017 Through 30-06-2017",
year = "2017",
month = aug,
day = "9",
doi = "10.1109/ISIT.2017.8006628",
language = "English (US)",
series = "IEEE International Symposium on Information Theory - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "749--753",
booktitle = "2017 IEEE International Symposium on Information Theory, ISIT 2017",
address = "United States",
}