An overview of information-theoretic security and privacy: Metrics, limits and applications
Research output: Contribution to journal › Review article › Contributed › peer-review
Contributors
Abstract
This tutorial reviews fundamental contributions to information security. An integrative viewpoint is taken that explains the security metrics, including secrecy, privacy, and others, the methodology of information-theoretic approaches, along with the arising system design principles, as well as techniques that enable the information-theoretic designs to be applied in real communication and computing systems. The tutorial, while summarizing these contributions, argues for the simultaneous pivotal role of fundamental limits and coding techniques for secure communication system design.
Details
Original language | English |
---|---|
Article number | 9380147 |
Pages (from-to) | 5-22 |
Number of pages | 18 |
Journal | IEEE Journal on selected areas in information theory : JSAIT |
Volume | 2 |
Issue number | 1 |
Publication status | Published - Mar 2021 |
Peer-reviewed | Yes |
Externally published | Yes |
External IDs
ORCID | /0000-0002-1702-9075/work/165878279 |
---|
Keywords
ASJC Scopus subject areas
Keywords
- Adversarial models, Coding, Information-theoretic security, Physical-layer security, Privacy, Secret key agreement, Security and privacy metrics, Wiretap channel