An overview of information-theoretic security and privacy: Metrics, limits and applications

Research output: Contribution to journalReview articleContributedpeer-review

Contributors

  • Matthieu Bloch - , Georgia Institute of Technology (Author)
  • Onur Günlü - , Technical University of Berlin (Author)
  • Aylin Yener - , Ohio State University (Author)
  • Frédérique Oggier - , Nanyang Technological University (Author)
  • H. Vincent Poor - , Princeton University (Author)
  • Lalitha Sankar - , Arizona State University (Author)
  • Rafael F. Schaefer - , University of Siegen (Author)

Abstract

This tutorial reviews fundamental contributions to information security. An integrative viewpoint is taken that explains the security metrics, including secrecy, privacy, and others, the methodology of information-theoretic approaches, along with the arising system design principles, as well as techniques that enable the information-theoretic designs to be applied in real communication and computing systems. The tutorial, while summarizing these contributions, argues for the simultaneous pivotal role of fundamental limits and coding techniques for secure communication system design.

Details

Original languageEnglish
Article number9380147
Pages (from-to)5-22
Number of pages18
Journal IEEE Journal on selected areas in information theory : JSAIT
Volume2
Issue number1
Publication statusPublished - Mar 2021
Peer-reviewedYes
Externally publishedYes

External IDs

ORCID /0000-0002-1702-9075/work/165878279

Keywords

Keywords

  • Adversarial models, Coding, Information-theoretic security, Physical-layer security, Privacy, Secret key agreement, Security and privacy metrics, Wiretap channel