{"title":"e -容量的外部边界-窃听信道的模糊区域","authors":"M. Haroutunian","doi":"10.1109/CSITechnol.2019.8895005","DOIUrl":null,"url":null,"abstract":"The basic wiretap channel model is considered. The aim is to maximize the rate of the reliable communication from the source to the legitimate receiver, while keeping the confidential information as secret as possible from the wiretapper (eavesdroper). The E-capacity - equivocation region, which is the generalization of the capacity - equivocation region, is investigated. The outer bound of this region is constructed.","PeriodicalId":414834,"journal":{"name":"2019 Computer Science and Information Technologies (CSIT)","volume":"73 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Outer Bound for E-capacity - Equivocation Region of the Wiretap Channel\",\"authors\":\"M. Haroutunian\",\"doi\":\"10.1109/CSITechnol.2019.8895005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The basic wiretap channel model is considered. The aim is to maximize the rate of the reliable communication from the source to the legitimate receiver, while keeping the confidential information as secret as possible from the wiretapper (eavesdroper). The E-capacity - equivocation region, which is the generalization of the capacity - equivocation region, is investigated. The outer bound of this region is constructed.\",\"PeriodicalId\":414834,\"journal\":{\"name\":\"2019 Computer Science and Information Technologies (CSIT)\",\"volume\":\"73 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Computer Science and Information Technologies (CSIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSITechnol.2019.8895005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Computer Science and Information Technologies (CSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSITechnol.2019.8895005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Outer Bound for E-capacity - Equivocation Region of the Wiretap Channel
The basic wiretap channel model is considered. The aim is to maximize the rate of the reliable communication from the source to the legitimate receiver, while keeping the confidential information as secret as possible from the wiretapper (eavesdroper). The E-capacity - equivocation region, which is the generalization of the capacity - equivocation region, is investigated. The outer bound of this region is constructed.