Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels

This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math notation="LaTeX">{\mathsf{K}}_{w} </tex-math></inline-formula> weak receivers and <inline-formula> <...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information theory Vol. 65; no. 8; pp. 5094 - 5124
Main Authors Kamel, Sarah, Sarkiss, Mireille, Wigger, Michele, Rekaya-Ben Othman, Ghaya
Format Journal Article
LanguageEnglish
Published New York IEEE 01.08.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Subjects
Online AccessGet full text
ISSN0018-9448
1557-9654
1557-9654
DOI10.1109/TIT.2019.2902578

Cover

Abstract This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math notation="LaTeX">{\mathsf{K}}_{w} </tex-math></inline-formula> weak receivers and <inline-formula> <tex-math notation="LaTeX">{\mathsf {K}}_{s} </tex-math></inline-formula> strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers.
AbstractList This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math notation="LaTeX">{\mathsf{K}}_{w} </tex-math></inline-formula> weak receivers and <inline-formula> <tex-math notation="LaTeX">{\mathsf {K}}_{s} </tex-math></inline-formula> strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers.
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with [Formula Omitted] weak receivers and [Formula Omitted] strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers.
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with K w weak receivers and K s strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers.
Author Wigger, Michele
Kamel, Sarah
Rekaya-Ben Othman, Ghaya
Sarkiss, Mireille
Author_xml – sequence: 1
  givenname: Sarah
  orcidid: 0000-0003-2230-3857
  surname: Kamel
  fullname: Kamel, Sarah
  email: sarah.kamel@huawei.com
  organization: LTCI, Telecom ParisTech, Paris, France
– sequence: 2
  givenname: Mireille
  orcidid: 0000-0002-8359-5921
  surname: Sarkiss
  fullname: Sarkiss, Mireille
  email: mireille.sarkiss@telecom-sudparis.eu
  organization: LIST, Communicating Systems Laboratory, BC 173, CEA, Gif-sur-Yvette, Frances
– sequence: 3
  givenname: Michele
  orcidid: 0000-0002-6737-5427
  surname: Wigger
  fullname: Wigger, Michele
  email: michele.wigger@telecom-paristech.fr
  organization: LTCI, Telecom ParisTech, Paris, France
– sequence: 4
  givenname: Ghaya
  surname: Rekaya-Ben Othman
  fullname: Rekaya-Ben Othman, Ghaya
  email: ghaya.rekaya@telecom-paristech.fr
  organization: LTCI, Telecom ParisTech, Paris, France
BackLink https://hal.science/hal-02440815$$DView record in HAL
BookMark eNptkUtLxDAURoMoOD72gpuCKxcdk-a9EXTwBSMuHNfhTnqLldqMSUfpv7dDRWFwEULCOeG7Xw7IbhtaJOSE0Slj1F4sHhbTgjI7LSwtpDY7ZMKk1LlVUuySCaXM5FYIs08OUnobjkKyYkIun9FH9H02gxX4uuvzR3wPsc8WEUoMVZWFKruJkNYRs-sYoPSQumz2Cm2LTToiexU0CY9_9kPycnuzmN3n86e7h9nVPPdc6S4vBKAWDHzJK8NLU3HuteEGsNRq6Q2CVZYuS6YrQ7nZrFIKjVBysNIs-SFh47vrdgX9FzSNW8X6HWLvGHWbAlxXd25TgPspYHDOR-cV_ugAtbu_mrvNHS2EoIbJTzawZyO7iuFjjalzb2Ed22EkVxSKGaMEUwOlRsrHkFLEyg2NQVeHtotQN79Rhr_YjkK3xO30_yino1Ij4i9ulNRWSP4N9kCTDQ
CODEN IETTAW
CitedBy_id crossref_primary_10_1109_TIT_2020_3036313
crossref_primary_10_1109_JSAIT_2021_3054663
crossref_primary_10_1109_TIT_2024_3384922
crossref_primary_10_1109_TIT_2023_3341148
Cites_doi 10.1109/TVT.2017.2756623
10.1109/ICCW.2015.7247223
10.1109/TCOMM.2017.2764892
10.1109/TIT.2006.871040
10.23919/WIOPT.2017.7959863
10.1109/TIT.2013.2238655
10.1109/ISWCS.2015.7454328
10.1109/ICC.2017.7996927
10.1109/TIT.2018.2835507
10.1109/TIFS.2014.2375553
10.1017/CBO9781139030687
10.1109/18.568694
10.1109/ICC.2016.7511291
10.1109/ISIT.2016.7541334
10.1109/ITW.2017.8277998
10.1109/CNS.2016.7860560
10.1109/TIT.2014.2306938
10.1109/JSAC.2016.2577198
10.1109/WCNC.2017.7925532
10.1002/j.1538-7305.1949.tb00928.x
10.1109/TIT.2006.871609
10.1109/TCOMM.2017.2751608
10.1109/CIG.2010.5592665
10.1109/ISIT.2017.8006723
10.1109/TWC.2017.2770097
10.1109/TIT.2012.2184668
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
1XC
VOOES
ADTOC
UNPAY
DOI 10.1109/TIT.2019.2902578
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1557-9654
EndPage 5124
ExternalDocumentID 10.1109/tit.2019.2902578
oai:HAL:hal-02440815v1
10_1109_TIT_2019_2902578
8657945
Genre orig-research
GrantInformation_xml – fundername: H2020 European Research Council
  grantid: 715111
  funderid: 10.13039/100010663
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
ESBDL
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
RIG
1XC
VOOES
ADTOC
UNPAY
ID FETCH-LOGICAL-c367t-24ae741acd3f83d8f33c7838aed76bc8ea9690bd17f80388038d547ead3a958b3
IEDL.DBID UNPAY
ISSN 0018-9448
1557-9654
IngestDate Sun Oct 26 02:37:30 EDT 2025
Sun Oct 19 06:20:28 EDT 2025
Mon Jun 30 06:42:55 EDT 2025
Wed Oct 01 02:55:16 EDT 2025
Thu Apr 24 23:08:25 EDT 2025
Wed Aug 27 05:50:49 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords wiretap channel
secure capacity-memory tradeoff
Index Terms-Broadcast channel
secrecy
caching
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html
Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c367t-24ae741acd3f83d8f33c7838aed76bc8ea9690bd17f80388038d547ead3a958b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6737-5427
0000-0003-2230-3857
0000-0002-8359-5921
0009-0006-0984-6768
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ielx7/18/8760492/08657945.pdf
PQID 2261886416
PQPubID 36024
PageCount 31
ParticipantIDs crossref_citationtrail_10_1109_TIT_2019_2902578
ieee_primary_8657945
proquest_journals_2261886416
hal_primary_oai_HAL_hal_02440815v1
unpaywall_primary_10_1109_tit_2019_2902578
crossref_primary_10_1109_TIT_2019_2902578
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-08-01
PublicationDateYYYYMMDD 2019-08-01
PublicationDate_xml – month: 08
  year: 2019
  text: 2019-08-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
– name: Institute of Electrical and Electronics Engineers
References ref13
ref12
ref15
ref14
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref26
ref25
ref20
ref22
ref21
ref27
ref8
ref7
ref9
mansour (ref23) 2015
ref4
ref3
ref6
ref5
References_xml – ident: ref12
  doi: 10.1109/TVT.2017.2756623
– ident: ref10
  doi: 10.1109/ICCW.2015.7247223
– ident: ref24
  doi: 10.1109/TCOMM.2017.2764892
– ident: ref21
  doi: 10.1109/TIT.2006.871040
– ident: ref14
  doi: 10.23919/WIOPT.2017.7959863
– ident: ref17
  doi: 10.1109/TIT.2013.2238655
– ident: ref2
  doi: 10.1109/ISWCS.2015.7454328
– ident: ref16
  doi: 10.1109/ICC.2017.7996927
– ident: ref3
  doi: 10.1109/TIT.2018.2835507
– ident: ref6
  doi: 10.1109/TIFS.2014.2375553
– ident: ref27
  doi: 10.1017/CBO9781139030687
– year: 2015
  ident: ref23
  publication-title: On the capacity of broadcast channels with degraded message sets and message cognition under different secrecy constraints
– ident: ref19
  doi: 10.1109/18.568694
– ident: ref11
  doi: 10.1109/ICC.2016.7511291
– ident: ref7
  doi: 10.1109/ISIT.2016.7541334
– ident: ref8
  doi: 10.1109/ITW.2017.8277998
– ident: ref9
  doi: 10.1109/CNS.2016.7860560
– ident: ref1
  doi: 10.1109/TIT.2014.2306938
– ident: ref4
  doi: 10.1109/JSAC.2016.2577198
– ident: ref15
  doi: 10.1109/WCNC.2017.7925532
– ident: ref18
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref26
  doi: 10.1109/TIT.2006.871609
– ident: ref5
  doi: 10.1109/TCOMM.2017.2751608
– ident: ref20
  doi: 10.1109/CIG.2010.5592665
– ident: ref25
  doi: 10.1109/ISIT.2017.8006723
– ident: ref13
  doi: 10.1109/TWC.2017.2770097
– ident: ref22
  doi: 10.1109/TIT.2012.2184668
SSID ssj0014512
Score 2.3606446
Snippet This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math...
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with [Formula Omitted] weak...
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with K w weak receivers and K s...
SourceID unpaywall
hal
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 5094
SubjectTerms Broadcast channel
Cache memory
caching
Coding
Computer memory
Computer Science
Electronic surveillance
Encoding
Information Theory
Libraries
Lower bounds
Receivers
secrecy
secure capacity-memory tradeoff
Tradeoffs
Upper bound
Upper bounds
wiretap channel
Wiretapping
Zinc
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3da9RAEB96fVEfrLaK0SqL-KKYu9vb3WTzIpTScorni1foW5j9ouCRK21OOf96Z_PFVUV8C2FCNpkZ5jffAG8casSQuzTEOJi0KFNTcJOizXKjyCviGEMDiy_Z_EJ-ulSXe_B-6IXx3jfFZ34cL5tcvlvbTQyVTXSmSHzUCEa5ztperSFjIBVvJ4NzUmDyOfqU5LSYLD8uYw1XMZ7FnFpcqLZjgkZXsQCy2axyB2Te21TXuP2Bq9WOvTk_gEV_0rbM5Nt4U5ux_fnbEMf__ZRH8LADnuyklZTHsOerQzjolzqwTscP4cHOhMIj-PA1wkq7ZadkVC0h9nQRS3O3jGyc8-sQ2Dqws5smzsjIpUdn8bZmsWehIqv7BC7Oz5an87RbuZBakeV1OpPoCWOgdSJo4XQQwuZaaPQuz4zVHgtyp43jedDNHBmhnZI5iaPAQmkjnsJ-ta78M2AzkU2R_r-a8iAJpqBXaDD4wswCd0EmMOm5UNpuHnlci7EqG79kWpTEtzLyrez4lsDb4YnrdhbHP2hfE2MHsjhEe37yuYz3CJVIAkLqO0_gKHJmoOqYksBxLwdlp9G3JcFUrnVG-DWBd4Ns_HEOUvE753j-91e8gPuRqq0kPIb9-mbjXxK6qc2rRqx_AUF084Q
  priority: 102
  providerName: IEEE
Title Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels
URI https://ieeexplore.ieee.org/document/8657945
https://www.proquest.com/docview/2261886416
https://hal.science/hal-02440815
https://ieeexplore.ieee.org/ielx7/18/8760492/08657945.pdf
UnpaywallVersion publishedVersion
Volume 65
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1557-9654
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014512
  issn: 1557-9654
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3da9RAEB_s9UH7YLVVGq0liC8KyV2yu8nmRThKyym2CN5B9SXMfqF45I42p55_vbP5OK4Kgr4lYRY2zMzOb3Zn5wfwwqBEdLmJnN8H4xp5pIpERaizXAnKihL0WwMXl9lkxt9eiastqi_PcNIUn9nYPzZn-V_s_Ec-TOSQPJcAbTokGC7IjkS8NG4HdjNBMHwAu7PL9-OP7cpLTswb5iwKl3lUZIL3R5SjwvMK-ZquIk79GZsnWNsKSTuffUFkw7RyC3TeXVVLXH_H-Xwr_pzvw6d-5m3Zydd4VatY__ytqeN__doDuN-h0nDcmtFDuGOrA9jvGR_CbgE4gL2t9oWH8PqDx5x6HZ5SxNUE56MLX7e7DikAGrtwLly48Oy62YQMKd9Ho_GmDv2FhopC8iOYnZ9NTydRx8cQaZbldZRytARAUBvmJDPSMaZzySRak2dKS4sF5drKJLmTTZMZJo3gOdkqw0JIxR7DoFpU9gjClGUjJGWIUeI4YRi0AhU6W6jUJcbxAIa9SkrdNSv3nBnzsklaRkU5fTMtvRLLTokBvNyMWLaNOv4i-5y0vBHzHbYn43el_0aQhRNKEt-SAA69mjZSnWICOO6Nouzc_aYkDJtImRG4DeDVxlD-mAcZ3q15PPkX4adwz7-2xYfHMKivV_YZAaJanTS3Fk86B_gFbDsBzA
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB615VB6oNCCMBSwEBcQTrLZXXt9QaqqVikkvZBKvVmzLyEROVXrFIVfz6xfSgEhbpa1lteeGc03j_0G4J1Fhegzm_iQBxMGRaJzphM0aaYlRUUMQ2pgdpFOLsXnK3m1BR_7szDOubr5zA3CZV3Lt0uzCqmyoUolqY_chgdSCCGb01p9zUBI1nCDMzJhijq6ouQoH87P56GLKx-MQ1UtjFTbcELb30ILZD1b5R7M3F2V17j-gYvFhsc524dZt9em0eT7YFXpgfn5G43j_37MY3jUQs_4uNGVJ7DlygPY78Y6xK2VH8DeBkfhIXz6GoClWccn5FYNYfZkFppz1zF5OeuW3sdLH5_e1JnGmIJ6tAZvqzicWijJ7z6Fy7PT-ckkaYcuJIanWZWMBTpCGWgs94pb5Tk3meIKnc1SbZTDnAJqbVnmVc0kw5WVIiOF5JhLpfkz2CmXpXsO8ZinI6T_L0fMCwIq6CRq9C7XY8-sFxEMOykUpmUkD4MxFkUdmYzyguRWBLkVrdwieN8_cd2wcfxj7VsSbL8s0GhPjqdFuEe4RBAUkncsgsMgmX5VK5QIjjo9KFqbvi0IqDKlUkKwEXzodeOPfZCR39vHi7-_4g3sTuazaTE9v_jyEh6GJ5q-wiPYqW5W7hVhnUq_rlX8Fyfv9tE
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fa9RAEB7s9UH7YLVVjFYJ4otCcpfsbrJ5EY7ScootgndQfQmzv6h45I42Vz3_emfz47gqCPqWhAlsmG93vtmdzAfwyqBEdLmJnN8H4xp5pIpERaizXAnKihL0WwNn59lkxt9fiIstqS-vcNIUn9nYXzZn-V_t_Ec-TOSQZi4R2nRINFwQjkS8NG4HdjNBNHwAu7Pzj-PP7cpLk5g3ylkULvOoyATvjyhHhdcV8jVdRZz6MzYvsLYVknYufUFko7Ryi3TeXVVLXH_H-Xwr_pzuw5d-5G3Zybd4VatY__ytqeN_fdoDuN-x0nDcwugh3LHVAez3ig9htwAcwN5W-8JDePvJc069Do8p4mqi89GZr9tdhxQAjV04Fy5ceHLVbEKGlO-j0Xhdh_6HhopC8iOYnZ5MjydRp8cQaZbldZRytERAUBvmJDPSMaZzySRak2dKS4sF5drKJLmTTZMZJo3gOWGVYSGkYo9hUC0q-wTClGUjJGeIUeI4cRi0AhU6W6jUJcbxAIa9S0rdNSv3mhnzsklaRkU5fTctvRPLzokBvN68sWwbdfzF9iV5eWPmO2xPxh9K_4woCyeWJG6SAA69mzZWnWMCOOpBUXbT_bokDptImRG5DeDNBih_jIOAd2scT__F-Bnc87dt8eERDOqrlX1OhKhWLzro_wJnBADL
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secrecy+Capacity-Memory+Tradeoff+of+Erasure+Broadcast+Channels&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Kamel%2C+Sarah&rft.au=Sarkiss%2C+Mireille&rft.au=Wigger%2C+Michele&rft.au=Ghaya+Rekaya-Ben+Othman&rft.date=2019-08-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=65&rft.issue=8&rft.spage=5094&rft_id=info:doi/10.1109%2FTIT.2019.2902578&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon