Jochen Sommerfeld’s research while affiliated with Technical University of Munich and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


Capacity Results for Arbitrarily Varying Wiretap Channels
  • Article

September 2012

·

32 Reads

·

80 Citations

Lecture Notes in Computer Science

·

Holger Boche

·

Jochen Sommerfeld

In this work the arbitrarily varying wiretap channel AVWC is studied. We derive a lower bound on the random code secrecy capacity for the average error criterion and the strong secrecy criterion in the case of a best channel to the eavesdropper by using Ahlswede's robustification technique for ordinary AVCs. We show that in the case of a non-symmetrisable channel to the legitimate receiver the deterministic code secrecy capacity equals the random code secrecy capacity, a result similar to Ahlswede's dichotomy result for ordinary AVCs. Using this we can derive that the lower bound is also valid for the deterministic code capacity of the AVWC. The proof of the dichotomy result is based on the elimination technique introduced by Ahlswede for ordinary AVCs. We further prove upper bounds on the deterministic code secrecy capacity in the general case, which results in a multi-letter expression for the secrecy capacity in the case of a best channel to the eavesdropper. Using techniques of Ahlswede, developed to guarantee the validity of a reliability criterion, the main contribution of this work is to integrate the strong secrecy criterion into these techniques.


Strong secrecy in arbitrarily varying wiretap channels

September 2012

·

13 Reads

·

10 Citations

In this work the arbitrarily varying wiretap channel AVWC under the average error criterion and the strong secrecy criterion is studied. We show that in the case of a non-symmetrisable channel to the legitimate receiver the deterministic code secrecy capacity equals the random code secrecy capacity and thus we establish a result for the AVWC similar to that of Ahlswede's dichotomy for ordinary AVCs. We derive a lower bound on the random code secrecy capacity in the case of a best channel to the eavesdropper. We further prove upper bounds on the deterministic code secrecy capacity, which in special cases results in explicit expressions of the secrecy capacity.


Secrecy Results for Compound Wiretap Channels

June 2011

·

30 Reads

·

124 Citations

Problems of Information Transmission

We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a stronger secrecy criterion and the maximum error probability criterion, and with a decoder that is robust against the effect of randomisation in the encoding. This relieves us from the need of decoding the randomisation parameter which is in general not possible within this model. Moreover we prove a lower bound on the secrecy capacity of the compound wiretap channel without channel state information and derive a multi-letter expression for the capacity in this communication scenario.


Capacity results for compound wiretap channels

March 2011

·

28 Reads

·

24 Citations

We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a quite strong secrecy criterion and with a decoder that is robust against the effect of randomisation in the encoding. This relieves us from the need of decoding the randomisation parameter which is in general not possible within this model. Moreover we prove a lower bound on the secrecy capacity of the compound wiretap channel without channel state information.


On the Boundedness of the Support of Optimal Input Measures for Rayleigh Fading Channels

August 2008

·

14 Reads

·

13 Citations

We consider transmission over a wireless multiple antenna communication system operating in a Rayleigh flat fading environment with no channel state information at the receiver and the transmitter. We show that, subject to the average power constraint, the support of the capacity achieving input distribution is bounded. Moreover, we show by a simple example concerning the identity theorem (or uniqueness theorem) from the complex analysis in several variables that some of the existing results in the field are not rigorous.

Citations (5)


... On the other hand, AVCs are also studied in network settings throughout [12][13][14][15][16][17][18], such as multiple-access and broadcast channels. The authors in Reference [12][13][14] investigated the capacity of arbitrarily varying multiple-access channels (AVMACs). ...

Reference:

List-Decoding Capacity of the Gaussian Arbitrarily-Varying Channel
Strong secrecy in arbitrarily varying wiretap channels
  • Citing Conference Paper
  • September 2012

... Furthermore, the authors provided a single-letter formula for the CRassisted secrecy capacity for the strongly degraded case with independent states. In [19], the AVWC under the average error criterion is investigated. The authors combined strong secrecy requirements with Ahlswede's Elimination Technique (ET) and were able to derive a single-letter formula for the CR-assisted achievable secrecy rates. ...

Capacity Results for Arbitrarily Varying Wiretap Channels
  • Citing Article
  • September 2012

Lecture Notes in Computer Science

... Therefore, to apply the Identity Theorem directly for n > 1, a random vector with support containing an open subset of C n must be considered. It was suspected by some authors that, since R n is not open in C n , no topological assumption on the support of the capacity-achieving distribution would be sufficient for this purpose [5,10,11]. Therefore, many papers restrict their models to ones that maintain spherical symmetry so that the capacity-achieving distribution can be expressed as a one-dimensional function of radius (e.g., Refs. [5][6][7][8]). ...

On the Boundedness of the Support of Optimal Input Measures for Rayleigh Fading Channels
  • Citing Conference Paper
  • August 2008

... It must be assumed that a lack of information about the channel conditions connecting the sender to the eavesdropper is present as well, which increases the challenge of guaranteeing not only accurate data transmission to the legitimate receiver, but also vanishing information leakage to the eavesdropper. The corresponding classical system has been investigated in works such as [14] when all channel parameters are perfectly known, and in [3], [8] for compound wiretap channels. The secrecy capacity of quantum channels with finite-dimensional Hilbert spaces was proven in [5] and independently in [4]. ...

Secrecy Results for Compound Wiretap Channels
  • Citing Article
  • June 2011

Problems of Information Transmission

... However, the study of secure communications was not confined to the single-user channels and expanded to multi-terminal channels (Multiple access channels, Interference Channels, etc.). Some related works can be found in [4][5][6][7][8][9]. The basis of all the above models is sending private classical information over a noisy classical channel to one or more legitimate receivers at the presence of one or more passive eavesdroppers. ...

Capacity results for compound wiretap channels
  • Citing Article
  • March 2011