Using a secret key to foil an eavesdropper

Paul Cuff

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

This work addresses secrecy with distributed systems in mind. We consider an adversary who wishes to attack a system and find the optimal communication and use of secret key to share information in such a system. Instead of measuring secrecy by "equivocation," we define a value function for the system, based on the actions of the system and the adversary, and set out to design a system that maximizes the average value obtained against the worst adversary.

Original languageAmerican English
Title of host publication2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Pages1405-1411
Number of pages7
DOIs
StatePublished - 2010
Event48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 - Monticello, IL, United States
Duration: Sep 29 2010Oct 1 2010

Publication series

Name2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010

Other

Other48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Country/TerritoryUnited States
CityMonticello, IL
Period9/29/1010/1/10

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Using a secret key to foil an eavesdropper'. Together they form a unique fingerprint.

Cite this