Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper
For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each source symbol subject to a decoding delay constraint without the eavesdropper gaining any information from his observation. For a certain cl...
Saved in:
Published in | Proceedings / IEEE International Symposium on Information Theory pp. 960 - 965 |
---|---|
Main Author | |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2020
|
Subjects | |
Online Access | Get full text |
ISSN | 2157-8117 |
DOI | 10.1109/ISIT44484.2020.9174235 |
Cover
Abstract | For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each source symbol subject to a decoding delay constraint without the eavesdropper gaining any information from his observation. For a certain class of code parameters, we propose delay-optimal M-link codes that recover multiple bursts of erasures of a limited length, and where the codes provide perfect security even if the eavesdropper can observe a link of his choice. Our codes achieve the maximum secrecy rate for the channel model. |
---|---|
AbstractList | For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each source symbol subject to a decoding delay constraint without the eavesdropper gaining any information from his observation. For a certain class of code parameters, we propose delay-optimal M-link codes that recover multiple bursts of erasures of a limited length, and where the codes provide perfect security even if the eavesdropper can observe a link of his choice. Our codes achieve the maximum secrecy rate for the channel model. |
Author | Frank, Anna |
Author_xml | – sequence: 1 givenname: Anna surname: Frank fullname: Frank, Anna organization: Technische Universität München,Lehrstuhl für Theoretische Informationstechnik |
BookMark | eNotkNFOwjAYhavRRECewMT0BYb9227tLnWikpBgAl6Tf6yVmtIt7YDw9mLk6lx8J19yzpDchDYYQh6BTQBY-TRbzlZSSi0nnHE2KUFJLvIrMi6VBsU1FFJwfU0GHHKVaQB1R4Yp_TAmlGB8QOyr8XjKFl3vduhp1TYufFPbRro0m300dBUxpJ1LybWBtgcT6SdG9N54-rKPqafTiOmvWG0xBOMTPbp-SzHQKR5MamLbdSbek1uLPpnxJUfk6226qj6y-eJ9Vj3PM8eZ6LONNrKsGywtqIJJZjG3XOalZLVECWJjC9RQS6mgOCObY62L5gy0hVqpWozIw7_XGWPWXTyPiqf15RbxCzibWlo |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/ISIT44484.2020.9174235 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9781728164328 172816432X |
EISSN | 2157-8117 |
EndPage | 965 |
ExternalDocumentID | 9174235 |
Genre | orig-research |
GroupedDBID | 6IE 6IH 6IK 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i203t-c8e49bda9f176040fa5f245940b4a413cf6a81b44716a5ff5ab86d4138f1b77b3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 06 17:53:36 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-c8e49bda9f176040fa5f245940b4a413cf6a81b44716a5ff5ab86d4138f1b77b3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9174235 |
PublicationCentury | 2000 |
PublicationDate | 2020-June |
PublicationDateYYYYMMDD | 2020-06-01 |
PublicationDate_xml | – month: 06 year: 2020 text: 2020-June |
PublicationDecade | 2020 |
PublicationTitle | Proceedings / IEEE International Symposium on Information Theory |
PublicationTitleAbbrev | ISIT |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0037302 |
Score | 1.7471046 |
Snippet | For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 960 |
SubjectTerms | burst erasure multiple-link code Channel models Codes Delays Galois fields low delay Oral communication Receivers Security streaming code Surveillance Symbols Wireless networks |
Title | Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper |
URI | https://ieeexplore.ieee.org/document/9174235 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT8IwEG-AJ59QwfidPvjoxj66sb6KEDBBSYSEN9Ju18SIGxmbif71XruB0fjg27Ju2dLr3e_u17seITeo_uh3BmCFAsXAPNe3okQpi0dBJOOQx4kJFKeP4XjBHpbBskFu97UwAGCSz8DWl2YvP8niUlNlPQwtEP2DJmniMqtqtXZW18eV6tUVwK7De5PnyZxh6KFpE8-x6zd_tFAxCDJqk-nu21XiyKtdFtKOP38dy_jfnzsk3e9aPTrbo9ARaUB6TNq7Zg201t0OUfewFh_WE5qIN7Gmg0w_TtFlpYZyB2pQC6Wu6TOqEzvpTOS608qa3pXoI9JhbuhEqgsSUoRUqjlcKlI6FO-wTfJss4G8Sxaj4XwwtuomC9aL5_iFFUfAuEwEV24_RI1WIlAeCzhzJBOIcLFCKbqSIYiFOKQCIaMwwYFIubLfl_4JaaVZCqeESrQHILnnMojRD-RCoP-glKu4CmUkvTPS0dO22lTnaKzqGTv_-_YFOdCiq9KyLkmryEu4QgegkNdG8l9Z2rHI |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT8IwEG8QH_QJFYzf9sFHN_fRjvVVhIACkggJb6Td2sSIG5mbif71XruB0fjg27Ju2dLr3e_u17seQleg_uB3UmkFHMRAPNe3wlgpi4U0FFHAotgEiqNx0J-R-zmd19D1phZGSmmSz6StL81efpxGhabKbiC0APSnW2gbcJ_QslprbXd9WKteVQPsOuxm8DSYEgg-NHHiOXb17o8mKgZDeg00Wn-9TB15sYtc2NHnr4MZ__t7e6j1Xa2HJxsc2kc1mRygxrpdA660t4nUnVzyD-sRjMQrX-JOqh_H4LRiQ7pLbHAL5K4JNKxTO_GEZ7rXyhLfFuAl4m5mCEWsSxISAFWsWVzME9zl7_ItztLVSmYtNOt1p52-VbVZsJ49x8-tKJSEiZgz5bYD0GnFqfIIZcQRhAPGRQrk6AoCMBbAkKJchEEMA6FyRbst_ENUT9JEHiEswCJIwTyXyAg8QcY5eBBKuYqpQITCO0ZNPW2LVXmSxqKasZO_b1-inf50NFwMB-OHU7SrxVgmaZ2hep4V8hzcgVxcmFXwBdT-tRU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+%2F+IEEE+International+Symposium+on+Information+Theory&rft.atitle=Delay-Optimal+Coding+for+Secure+Transmission+over+Parallel+Burst+Erasure+Channels+with+an+Eavesdropper&rft.au=Frank%2C+Anna&rft.date=2020-06-01&rft.pub=IEEE&rft.eissn=2157-8117&rft.spage=960&rft.epage=965&rft_id=info:doi/10.1109%2FISIT44484.2020.9174235&rft.externalDocID=9174235 |