{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:21:31Z","timestamp":1760242891581,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T00:00:00Z","timestamp":1477872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61271222","61271174","61301178"],"award-info":[{"award-number":["61271222","61271174","61301178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2013CB338004"],"award-info":[{"award-number":["2013CB338004"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Program of Shanghai Municipal Education Commission","award":["14ZZ017"],"award-info":[{"award-number":["14ZZ017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The secrecy capacity of an extended communication model of wiretap channelII is determined. In this channel model, the source message is encoded into a digital sequence of length N and transmitted to the legitimate receiver through a discrete memoryless channel (DMC). There exists an eavesdropper who is able to observe arbitrary     \u03bc = N \u03b1     digital symbols from the transmitter through a second DMC, where     0 \u2264 \u03b1 \u2264 1     is a constant real number. A pair of an encoder and a decoder is designed to let the receiver be able to recover the source message with a vanishing decoding error probability and keep the eavesdropper ignorant of the message. This communication model includes a variety of wiretap channels as special cases. The coding scheme is based on that designed by Ozarow and Wyner for the classic wiretap channel II.<\/jats:p>","DOI":"10.3390\/e18110377","type":"journal-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T11:09:46Z","timestamp":1477912186000},"page":"377","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy Capacity of the Extended Wiretap Channel II with Noise"],"prefix":"10.3390","volume":"18","author":[{"given":"Dan","family":"He","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9729-0005","authenticated-orcid":false,"given":"Wangmei","family":"Guo","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Yuan","family":"Luo","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Shanghai Jiao Tong University, Shanghai 200240, China"}]}],"member":"1968","published-online":{"date-parts":[[2016,10,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","article-title":"Broadcast channels with confidential messages","volume":"24","year":"1978","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/TIT.2007.911157","article-title":"Wiretap channel with side information","volume":"54","author":"Chen","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.3390\/e14091671","article-title":"Some new results on the wiretap channel with side information","volume":"14","author":"Dai","year":"2012","journal-title":"Entropy"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Dai, B., Vinck Han, A.J., Luo, Y., and Zhuang, Z. (2012, January 1\u20136). Degraded Broadcast Vhannel with Noncausal Side Information, Confidential Messages and Noiseless Feedback. Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA.","DOI":"10.1109\/ISIT.2012.6284226"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1109\/TIFS.2011.2151188","article-title":"Secrete-key agreement with channel state information at the transmitter","volume":"6","author":"Khisti","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2838","DOI":"10.1109\/TIT.2011.2181329","article-title":"Wiretap channel with causal state information","volume":"58","author":"Chia","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Dai, B., Luo, Y., and Vinck Han, A.J. (2010, January 16\u201318). Capacity Region of Broadcast Channels with Private Message and Causual Side Information. Proceedings of the 3rd International Congress on Image and Signal Processing, Yantai, China.","DOI":"10.1109\/CISP.2010.5646806"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Liang, Y., Kramer, G., Poor, H., and Shamai, S. (2008). Compound wiretap channel. EURASIP J. Wirel. Commun. Netw.","DOI":"10.1155\/2009\/142374"},{"key":"ref_10","first-page":"73","article-title":"Capacity results for compound wiretap channels","volume":"49","author":"Boche","year":"2011","journal-title":"Probl. Inf. Transm."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1720","DOI":"10.1109\/TIFS.2014.2348193","article-title":"Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance","volume":"9","author":"Schaefer","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"5535","DOI":"10.1109\/TIT.2015.2458856","article-title":"The secrecy capacity of compound gaussian MIMO wiretap channels","volume":"61","author":"Schaefer","year":"2015","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_13","first-page":"123","article-title":"Capacity results for arbitrarily varying wiretap channel","volume":"7777","author":"Boche","year":"2013","journal-title":"Inf. Theory Comb. Search Theory Lect. Notes Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1002\/j.1538-7305.1984.tb00072.x","article-title":"Wire-tap channel II","volume":"63","author":"Ozarow","year":"1984","journal-title":"AT&T Bell Labs Tech. J."},{"key":"ref_15","unstructured":"Cai, N., and Yeung, R.W. (July, January 30). Secure Network Coding. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Lausanne, Switzerland."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/TIT.2010.2090197","article-title":"Secure network coding on a wiretap network","volume":"57","author":"Cai","year":"2011","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_17","unstructured":"Feldman, J., Malkin, T., and Stein, C. (October, January 29). On the Capacity of Secure Network Coding. Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA."},{"key":"ref_18","first-page":"1","article-title":"Weakly secure network coding","volume":"4","author":"Bhattad","year":"2005","journal-title":"Proc. NetCod"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3345","DOI":"10.1109\/TIT.2014.2315821","article-title":"Performance bounds on a wiretap network with arbitrary wiretap sets","volume":"60","author":"Cheng","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"238","DOI":"10.3390\/e18070238","article-title":"Strong secrecy capacity of a class of wiretap networks","volume":"18","author":"He","year":"2016","journal-title":"Entropy"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Nafea, M., and Yener, A. (2015, January 14\u201319). Wiretap Channel II with a Noisy Main Channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Hong Kong, China.","DOI":"10.1109\/ISIT.2015.7282637"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3863","DOI":"10.1109\/TIT.2016.2565483","article-title":"Semantic-security capacity for wiretap channels of type II","volume":"62","author":"Goldfeld","year":"2016","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"He, D., Luo, Y., and Cai, N. (2016, January 10\u201315). Strong Secrecy Capacity of the Wiretap Channel II with DMC Main Channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain.","DOI":"10.1109\/ISIT.2016.7541350"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1109\/TIT.2004.842763","article-title":"Some new characters on the wiretap channel of type II","volume":"51","author":"Luo","year":"2005","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_25","first-page":"4489","article-title":"A combination of the wiretap channel and the wiretap channel of type II","volume":"10","author":"Yang","year":"2014","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_26","unstructured":"He, D., and Luo, Y. (2012, January 9\u201311). A Kind of Non-DMC Erasure Wiretap Channel. Proceedings of the IEEE International Conference on Communication Technology (ICCT), Chengdu, China."},{"key":"ref_27","first-page":"265","article-title":"Topics in multi-user information theory. Foundations Trends\u00ae","volume":"4","author":"Kramer","year":"2007","journal-title":"Commun. Inf. Theory"},{"key":"ref_28","unstructured":"Yeung, R.W. (2008). Information Theory and Network Coding, Springer."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/18\/11\/377\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:34:22Z","timestamp":1760211262000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/18\/11\/377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,31]]},"references-count":28,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2016,11]]}},"alternative-id":["e18110377"],"URL":"https:\/\/doi.org\/10.3390\/e18110377","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2016,10,31]]}}}