TY - GEN
T1 - Using a secret key to foil an eavesdropper
AU - Cuff, Paul
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2010
Y1 - 2010
N2 - This work addresses secrecy with distributed systems in mind. We consider an adversary who wishes to attack a system and find the optimal communication and use of secret key to share information in such a system. Instead of measuring secrecy by "equivocation," we define a value function for the system, based on the actions of the system and the adversary, and set out to design a system that maximizes the average value obtained against the worst adversary.
AB - This work addresses secrecy with distributed systems in mind. We consider an adversary who wishes to attack a system and find the optimal communication and use of secret key to share information in such a system. Instead of measuring secrecy by "equivocation," we define a value function for the system, based on the actions of the system and the adversary, and set out to design a system that maximizes the average value obtained against the worst adversary.
UR - http://www.scopus.com/inward/record.url?scp=79952385460&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952385460&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2010.5707078
DO - 10.1109/ALLERTON.2010.5707078
M3 - Conference contribution
AN - SCOPUS:79952385460
SN - 9781424482146
T3 - 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
SP - 1405
EP - 1411
BT - 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
T2 - 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Y2 - 29 September 2010 through 1 October 2010
ER -