Using a secret key to foil an eavesdropper

Paul Cuff

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

This work addresses secrecy with distributed systems in mind. We consider an adversary who wishes to attack a system and find the optimal communication and use of secret key to share information in such a system. Instead of measuring secrecy by "equivocation," we define a value function for the system, based on the actions of the system and the adversary, and set out to design a system that maximizes the average value obtained against the worst adversary.

Original languageEnglish (US)
Title of host publication2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Pages1405-1411
Number of pages7
DOIs
StatePublished - Dec 1 2010
Event48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 - Monticello, IL, United States
Duration: Sep 29 2010Oct 1 2010

Publication series

Name2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010

Other

Other48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
CountryUnited States
CityMonticello, IL
Period9/29/1010/1/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'Using a secret key to foil an eavesdropper'. Together they form a unique fingerprint.

  • Cite this

    Cuff, P. (2010). Using a secret key to foil an eavesdropper. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 (pp. 1405-1411). [5707078] (2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010). https://doi.org/10.1109/ALLERTON.2010.5707078