Abstract
We introduce a new model, the broadcast channel with confidential messages, with tampering. Here, the enemy not only taps the wire but also actively tampers the signal communicated over the wire. We show that the legitimate users always have to take a certain worst case scenario into account.
Original language | English |
---|---|
Title of host publication | IEEE International Symposium on Information Theory - Proceedings |
Publisher | IEEE |
Publication status | Published - 1995 |
Externally published | Yes |
Event | Proceedings of the 1995 IEEE International Symposium on Information Theory - Duration: 17 Sept 1995 → 22 Sept 1995 |
Conference
Conference | Proceedings of the 1995 IEEE International Symposium on Information Theory |
---|---|
Period | 17/09/95 → 22/09/95 |