Skip to main content

Showing 1–35 of 35 results for author: Oohama, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.12376  [pdf, other

    cs.MA

    MARPF: Multi-Agent and Multi-Rack Path Finding

    Authors: Hiroya Makino, Yoshihiro Ohama, Seigo Ito

    Abstract: In environments where many automated guided vehicles (AGVs) operate, planning efficient, collision-free paths is essential. Related research has mainly focused on environments with static passages, resulting in space inefficiency. We define multi-agent and multi-rack path finding (MARPF) as the problem of planning paths for AGVs to convey target racks to their designated locations in environments… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 6 pages, 10 figures, submitted to IROS 2024

  2. arXiv:2302.01314  [pdf, ps, other

    cs.IT

    Universal Coding for Shannon Ciphers under Side-Channel Attacks

    Authors: Yasutada Oohama, Bagus Santoso

    Abstract: We study the universal coding under side-channel attacks posed and investigated by Oohama and Santoso (2022). They proposed a theoretical security model for Shannon cipher system under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdrop** the public communication channel, but is also allowed to collect the physical information leaked by the devices w… ▽ More

    Submitted 12 May, 2024; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: 6 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:1801.02563, arXiv:2201.11670, arXiv:1901.05940

  3. arXiv:2205.06027  [pdf, other

    cs.IT

    Algorithm Families for Computing Information-Theoretic Forms of Strong Converse Exponents in Channel Coding and Lossy Source Coding

    Authors: Yutaka Jitsumatsu, Yasutada Oohama

    Abstract: The error exponent of a discrete memoryless channel is expressed in two forms. One is Gallager's expression with a positive slope parameter and the other is Csiszar and Korner's information-theoretic representation expressed using the mutual information and the relative entropy. They differ in appearance, and existing methods to prove their agreement are not elementary, as they require an evaluati… ▽ More

    Submitted 4 November, 2022; v1 submitted 12 May, 2022; originally announced May 2022.

    Comments: 77 pages, 9 figures

  4. arXiv:2202.10018  [pdf, other

    cs.IT cs.CR

    Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

    Authors: Vamoua Yachongka, Hideki Yagi, Yasutada Oohama

    Abstract: We analyze the fundamental trade-off of secret key-based authentication systems in the presence of an eavesdropper for correlated Gaussian sources. A complete characterization of trade-off among secret-key, storage, and privacy-leakage rates of both generated and chosen secret models is provided. One of the main contributions is revealing that unlike the known results for discrete sources, there i… ▽ More

    Submitted 28 June, 2022; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: This work is presented at ISIT 2022

  5. arXiv:2201.11670  [pdf, ps, other

    cs.IT cs.CR

    Strong Converse Theorem for Source Encryption under Side-Channel Attacks

    Authors: Yasutada Oohama, Bagus Santoso

    Abstract: We are interested in investigating the security of source encryption with a symmetric key under side-channel attacks. In this paper, we propose a general framework of source encryption with a symmetric key under the side-channel attacks, which applies to \emph{any} source encryption with a symmetric key and \emph{any} kind of side-channel attacks targeting the secret key. We also propose a new sec… ▽ More

    Submitted 7 February, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: 9 pages, 6 figures. The short version of this paper was submitted to ISIT2022, arXiv admin note: text overlap with arXiv:1801.02563, arXiv:2102.06363

  6. arXiv:2102.06363  [pdf, ps, other

    cs.IT

    New Distributed Source Encryption Framework

    Authors: Yasutada Oohama, Bagus Santoso

    Abstract: We pose and investigate the distributed secure source coding based on the common key cryptosystem. This cryptosystem includes the secrecy amplification problem for distributed encrypted sources with correlated keys using post-encryption-compression, which was posed investigated by Santoso and Oohama. In this paper we propose another new security criterion which is generally more strict compared to… ▽ More

    Submitted 30 August, 2022; v1 submitted 12 February, 2021; originally announced February 2021.

    Comments: 9 pages, 3 figure. The short version was submitted to ISITA 2022. We have several typos in the short version. In this arXiv version we have fixed all those typos

  7. Biometric Identification Systems With Noisy Enrollment for Gaussian Source

    Authors: Vamoua Yachongka, Hideki Yagi, Yasutada Oohama

    Abstract: In the present paper, we investigate the fundamental trade-off of identification, secrecy, storage, and privacy-leakage rates in biometric identification systems for hidden or remote Gaussian sources. We introduce a technique for deriving the capacity region of these rates by converting the system to one where the data flow is in one-way direction. Also, we provide numerical calculations of three… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  8. arXiv:1904.04894  [pdf, ps, other

    cs.IT

    New Converse Bounds for Discrete Memoryless Channels in the Finite Blocklength Regime

    Authors: Yasutada Oohama

    Abstract: We study the determination problem of the channel capacity for the discrete memoryless channels in the finite blocklength regime. We derive explicit lower and upper bounds of the capacity. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.

    Submitted 9 April, 2019; originally announced April 2019.

    Comments: 10 pages, no figures, the short version was submitted to ITW2019

  9. arXiv:1901.06442  [pdf, other

    cs.IT

    The Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels

    Authors: Yutaka Jitsumatsu, Ukyo Michiwaki, Yasutada Oohama

    Abstract: Information leakage in Wyner's wiretap channel model is usually defined as the mutual information between the secret message and the eavesdropper's received signal. We define a new quantity called "conditional information leakage given the eavesdropper's received signals," which expresses the amount of information that eavesdropper gains from his/her received signal. A benefit of introducing this… ▽ More

    Submitted 24 January, 2019; v1 submitted 18 January, 2019; originally announced January 2019.

  10. Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks

    Authors: Bagus Santoso, Yasutada Oohama

    Abstract: We consider the secure communication problem for broadcasting of two encrypted sources. The sender wishes to broadcast two secret messages via two common key cryptosystems. We assume that the adversary can use the side-channel, where the side information on common keys can be obtained via the rate constraint noiseless channel. To solve this problem we formulate the post encryption coding system. O… ▽ More

    Submitted 1 March, 2019; v1 submitted 17 January, 2019; originally announced January 2019.

    Comments: 13 pages, 4 figures. In the current version we we have corrected errors in Fig. 2 and Fig. 4. arXiv admin note: substantial text overlap with arXiv:1801.02563, arXiv:1801.04920

  11. arXiv:1901.04968  [pdf, ps, other

    cs.IT

    A New Inequality Related to Proofs of Strong Converse Theorems for Source or Channel Networks

    Authors: Yasutada Oohama

    Abstract: In this paper we provide a new inequality useful for the proofs of strong converse theorems in the multiterminal information theory. We apply this inequality to the recent work by Tyagi and Watanabe on the strong converse theorem for the Wyner-Ziv source coding problem to obtain a new strong converse outer bound. This outer bound deviates from the Wyner-Ziv rate distortion region with the order… ▽ More

    Submitted 17 January, 2019; v1 submitted 15 January, 2019; originally announced January 2019.

    Comments: 10 pages

  12. arXiv:1801.04920  [pdf, other

    cs.IT

    Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders

    Authors: Bagus Santoso, Yasutada Oohama

    Abstract: This paper proposed the application of post-encryption-compression (PEC) to strengthen the secrecy in the case of distributed encryption where the encryption keys are correlated to each other. We derive the universal code construction for the compression and the rate region where codes with achievability and secrecy are obtainable. Our main technique is to use affine encoders which are constructed… ▽ More

    Submitted 13 January, 2018; originally announced January 2018.

    Comments: An extended abstract is submitted to ISIT 2018. This is the full version. arXiv admin note: text overlap with arXiv:1801.02563

  13. arXiv:1801.02563  [pdf, ps, other

    cs.IT

    Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System

    Authors: Yasutada Oohama, Bagus Santoso

    Abstract: We study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed sensors. This can be formulated as the one helper source coding problem posed and investigated by Ahlswede, Körner(1975), and Wyner(1975). We further investigate the posed problem to derive new secrecy bo… ▽ More

    Submitted 18 January, 2019; v1 submitted 8 January, 2018; originally announced January 2018.

    Comments: 12pages, 3 figures, the short version was presented at ISIT 2018

  14. On a Relationship between the Correct Probability of Estimation from Correlated Data and Mutual Information

    Authors: Yasutada Oohama

    Abstract: Let $X$, $Y$ be two correlated discrete random variables. We consider an estimation of $X$ from encoded data $\varphi(Y)$ of $Y$ by some encoder function $\varphi(Y)$. We derive an inequality describing a relation of the correct probability of estimation and the mutual information between $X$ and $\varphi(Y)$. This inequality may be useful for the secure analysis of crypto system when we use the s… ▽ More

    Submitted 4 February, 2017; originally announced February 2017.

  15. Exponent Function for Stationary Memoryless Channels with Input Cost at Rates above the Capacity

    Authors: Yasutada Oohama

    Abstract: We consider the stationaly memoryless channels with input cost. We prove that for transmission rates above the capacity the correct probability of decoding tends to zero exponentially as the block length $n$ of codes tends to infinity. In the case where both of channel input and output sets are finite, we determine the optimal exponent function on the above exponential decay of the correct probabi… ▽ More

    Submitted 4 February, 2017; v1 submitted 23 January, 2017; originally announced January 2017.

    Comments: 15pages. arXiv admin note: text overlap with arXiv:1701.06357

  16. arXiv:1701.06357  [pdf, ps, other

    cs.IT

    The Reliability Function for the Additive White Gaussian Noise Channel at Rates above the Capacity

    Authors: Yasutada Oohama

    Abstract: We consider the additive white Gaussian noise channels. We prove that the error probability of decoding tends to one exponentially for rates above the capacity and derive the optimal exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.

    Submitted 5 February, 2017; v1 submitted 23 January, 2017; originally announced January 2017.

    Comments: 11pages

  17. arXiv:1604.02901  [pdf, ps, other

    cs.IT

    New Strong Converse for Asymmetric Broadcast Channels

    Authors: Yasutada Oohama

    Abstract: We consider the discrete memoryless asymmetric broadcast channels. We prove that the error probability of decoding tends to one exponentially for rates outside the capacity region and derive an explicit lower bound of this exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.

    Submitted 9 August, 2020; v1 submitted 11 April, 2016; originally announced April 2016.

    Comments: 20 pages, 1 figures, a short version of this paper is submitted to the International Symposium on Information Theory and Its Applications(ISITA),October 30-November 2, 2016, Monterey, California, USA. arXiv admin note: text overlap with arXiv:1603.06344, arXiv:1601.05650

  18. arXiv:1603.06344  [pdf, ps, other

    cs.IT

    Strong Converse Exponent for State Dependent Channels With Full State Information at the Sender

    Authors: Yasutada Oohama

    Abstract: We consider the state dependent channels with full state information with at the sender. For this state dependent channel, the channel capacity was determined by Gel'fand and Pinsker. In this paper, we study the correct probability of decoding at rates above the capacity. We prove that when the transmission rate is above the capacity this probability goes to zero exponentially and derive an explic… ▽ More

    Submitted 10 August, 2020; v1 submitted 21 March, 2016; originally announced March 2016.

    Comments: The present version has 14 pages and one figure. In the previous version we have a gap on the proof of the main result. In the current version we have fixed the gap for the special case that the state information is not available at the receiver

  19. arXiv:1601.06094  [pdf, ps, other

    cs.IT

    An Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding Probability for Rates below the Rate Distortion Function

    Authors: Yutaka Jitsumatsu, Yasutada Oohama

    Abstract: The form of Dueck and Körner's exponent function for correct decoding probability for discrete memoryless channels at rates above the capacity is similar to the form of Csiszár and Körner's exponent function for correct decoding probability in lossy source coding for discrete memoryless sources at rates below the rate distortion function. We recently gave a new algorithm for computing Dueck and Kö… ▽ More

    Submitted 27 May, 2016; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: 9 pages, 1 figure

  20. arXiv:1601.05650  [pdf, ps, other

    cs.IT

    Exponent Function for Source Coding with Side Information at the Decoder at Rates below the Rate Distortion Function

    Authors: Yasutada Oohama

    Abstract: We consider the rate distortion problem with side information at the decoder posed and investigated by Wyner and Ziv. The rate distortion function indicating the trade-off between the rate on the data compression and the quality of data obtained at the decoder was determined by Wyner and Ziv. In this paper, we study the error probability of decoding at rates below the rate distortion function. We… ▽ More

    Submitted 26 April, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

    Comments: 17 pages, 1 figures, extended version of ISITA 2016 submission. arXiv admin note: text overlap with arXiv:1504.05891

  21. arXiv:1504.05948  [pdf, ps, other

    cs.IT

    Strong Converse Theorems for Degraded Broadcast Channels with Feedback

    Authors: Yasutada Oohama

    Abstract: We consider the discrete memoryless degraded broadcast channels with feedback. We prove that the error probability of decoding tends to one exponentially for rates outside the capacity region and derive an explicit lower bound of this exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: Short version of this paper is accepted for presentation at ISIT 2015. arXiv admin note: substantial text overlap with arXiv:1504.05941

  22. arXiv:1504.05941  [pdf, ps, other

    cs.IT

    Strong Converse Exponent for Degraded Broadcast Channels at Rates outside the Capacity Region

    Authors: Yasutada Oohama

    Abstract: We consider the discrete memoryless degraded broadcast channels. We prove that the error probability of decoding tends to one exponentially for rates outside the capacity region and derive an explicit lower bound of this exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: Short version of this paper is accepted for presentation at ISIT 2015

  23. arXiv:1504.05891  [pdf, ps, other

    cs.IT

    Exponent Function for One Helper Source Coding Problem at Rates outside the Rate Region

    Authors: Yasutada Oohama

    Abstract: We consider the one helper source coding problem posed and investigated by Ahlswede, Körner and Wyner. In this system, the error probability of decoding goes to one as the source block length $n$ goes to infinity. This implies that we have a strong converse theorem for the one helper source coding problem. In this paper we provide a much stronger version of this strong converse theorem for the one… ▽ More

    Submitted 17 January, 2019; v1 submitted 22 April, 2015; originally announced April 2015.

    Comments: 18 pages, 3 figures, short version of this paper was presented at ISIT 2015

  24. arXiv:1301.7046  [pdf, ps, other

    cs.IT

    Outer Bound of the Capacity Region for Identification via Multiple Access Channels

    Authors: Yasutada Oohama

    Abstract: In this paper we consider the identification (ID) via multiple access channels (MACs). In the general MAC the ID capacity region includes the ordinary transmission (TR) capacity region. In this paper we discuss the converse coding theorem. We estimate two types of error probabilities of identification for rates outside capacity region, deriving some function which serves as a lower bound of the su… ▽ More

    Submitted 9 February, 2013; v1 submitted 29 January, 2013; originally announced January 2013.

    Comments: This arXiv paper is a complete version of the paper submitted to IEEE ISIT 2013. After submission we found some minor mistakes in Property 1 b), Theorems 1 and 2 in the paper. In this arXiv version we have corrected those mistakes. A mistake in Version 4 in the description of the region C'(X,Y|W) in Property 2-b) is corrected in In the present version. Typos in the previous version are corrected

  25. arXiv:1204.5663  [pdf, ps, other

    cs.IT

    Cognitive Interference Channels with Confidential Messages under Randomness Constraint

    Authors: Shun Watanabe, Yasutada Oohama

    Abstract: The cognitive interference channel with confidential messages (CICC) proposed by Liang et. al. is investigated. When the security is considered in coding systems, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. For the CICC, the trade-off between the rate of the random number to… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: 10 pages, 1 figure. arXiv admin note: substantial text overlap with arXiv:1201.6468

  26. arXiv:1201.6468  [pdf, ps, other

    cs.IT

    Broadcast Channels with Confidential Messages by Randomness Constrained Stochastic Encoder

    Authors: Shun Watanabe, Yasutada Oohama

    Abstract: In coding schemes for the wire-tap channel or the broadcast channels with confidential messages, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. In this paper, it is investigated that the trade-off between the rate of the random number to realize the stochastic encoding and the… ▽ More

    Submitted 30 May, 2012; v1 submitted 31 January, 2012; originally announced January 2012.

    Comments: 13 pages, 3 figures, In v2, references and a numerical example are added. A part of this paper will be presented at ISIT2012

  27. arXiv:1009.5829  [pdf, ps, other

    cs.IT

    Capacity Results for Relay Channels with Confidential Messages

    Authors: Yasutada Oohama, Shun Watanabe

    Abstract: We consider a communication system where a relay helps transmission of messages from {a} sender to {a} receiver. The relay is considered not only as a helper but as a wire-tapper who can obtain some knowledge about transmitted messages. In this paper we study a relay channel with confidential messages(RCC), where a sender attempts to transmit common information to both a receiver and a relay and a… ▽ More

    Submitted 29 September, 2010; v1 submitted 29 September, 2010; originally announced September 2010.

    Comments: 31 pages, 8 figures

  28. Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication

    Authors: Shun Watanabe, Yasutada Oohama

    Abstract: We investigate the secret key agreement from correlated vector Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show that the optimal trade-off between the rate of key generation and the rate of the public communication is characterized as an optimization problem of a Gaussian r… ▽ More

    Submitted 12 October, 2010; v1 submitted 28 September, 2010; originally announced September 2010.

    Comments: 10 pages, 4 figures, A part of this paper was presented at 2010 IEEE International Symposium on Information Theory in Austin U.S.A, version 2 corrected Remark 6 and added some references

    Journal ref: IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 541-550, 2011

  29. arXiv:1008.1140  [pdf, ps, other

    cs.IT

    On Two Strong Converse Theorems for Stationary Discrete Memoryless Channels

    Authors: Yasutada Oohama

    Abstract: In 1973, Arimoto proved the strong converse theorem for the discrete memoryless channels stating that when transmission rate $R$ is above channel capacity $C$, the error probability of decoding goes to one as the block length $n$ of code word tends to infinity. He proved the theorem by deriving the exponent function of error probability of correct decoding that is positive if and only if $R>C$. Su… ▽ More

    Submitted 2 May, 2012; v1 submitted 6 August, 2010; originally announced August 2010.

    Comments: 5 pages, 1 table

  30. arXiv:1007.4418  [pdf, ps, other

    cs.IT

    Distributed Source Coding of Correlated Gaussian Sources

    Authors: Yasutada Oohama

    Abstract: We consider the distributed source coding system of $L$ correlated Gaussian sources $Y_i,i=1,2,...,L$ which are noisy observations of correlated Gaussian remote sources $X_k, k=1,2,...,K$. We assume that $Y^{L}={}^{\rm t}(Y_1,Y_2,$ $..., Y_L)$ is an observation of the source vector $X^K={}^{\rm t}(X_1,X_2,..., X_K)$, having the form $Y^L=AX^K+N^L$, where $A$ is a $L\times K$ matrix and… ▽ More

    Submitted 18 February, 2011; v1 submitted 26 July, 2010; originally announced July 2010.

    Comments: 30 pages 4 figures

  31. Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication

    Authors: Shun Watanabe, Yasutada Oohama

    Abstract: We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential differenc… ▽ More

    Submitted 4 March, 2011; v1 submitted 20 January, 2010; originally announced January 2010.

    Comments: 9 pages, no figure, Version 2 is a published version. The results are not changed from version 1. Explanations are polished

    Journal ref: IEICE Trans. Fundamentals, vol. 93, no. 11, pp. 1976-1983, November 2010

  32. arXiv:0908.3982  [pdf, ps, other

    cs.IT

    Distributed Source Coding for Correlated Memoryless Gaussian Sources

    Authors: Yasutada Oohama

    Abstract: We consider a distributed source coding problem of $L$ correlated Gaussian observations $Y_i, i=1,2,...,L$. We assume that the random vector $Y^{L}={}^{\rm t} (Y_1,Y_2,$ $...,Y_L)$ is an observation of the Gaussian random vector $X^K={}^{\rm t}(X_1,X_2,...,X_K)$, having the form $Y^L=AX^K+N^L ,$ where $A$ is a $L\times K$ matrix and $N^L={}^{\rm t}(N_1,N_2,...,N_L)$ is a vector of $L$ independen… ▽ More

    Submitted 13 January, 2010; v1 submitted 27 August, 2009; originally announced August 2009.

    Comments: 23 pages, 2 figures

  33. arXiv:0904.0751  [pdf, ps, other

    cs.IT

    Distributed Source Coding of Correlated Gaussian Remote Sources

    Authors: Yasutada Oohama

    Abstract: We consider the distributed source coding system for $L$ correlated Gaussian observations $Y_i, i=1,2, ..., L$. Let $X_i,i=1,2, ..., L$ be $L$ correlated Gaussian random variables and $N_i,$ $i=1,2,... L$ be independent additive Gaussian noises also independent of $X_i, i=1,2,..., L$. We consider the case where for each $i=1,2,..., L$, $Y_i$ is a noisy observation of $X_i$, that is,… ▽ More

    Submitted 9 August, 2009; v1 submitted 5 April, 2009; originally announced April 2009.

    Comments: 20 pages,3 figres

  34. arXiv:0901.1988  [pdf, ps, other

    cs.IT

    Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation

    Authors: Yasutada Oohama

    Abstract: In this paper we consider the separate coding problem for $L+1$ correlated Gaussian memoryless sources. We deal with the case where $L$ separately encoded data of sources work as side information at the decoder for the reconstruction of the remaining source. The determination problem of the rate distortion region for this system is the so called many-help-one problem and has been known as a highly… ▽ More

    Submitted 7 May, 2024; v1 submitted 14 January, 2009; originally announced January 2009.

    Comments: 21 pages, 4 figures

  35. arXiv:cs/0611125  [pdf, ps, other

    cs.IT

    Relay Channels with Confidential Messages

    Authors: Yasutada Oohama

    Abstract: We consider a relay channel where a relay helps the transmission of messages from one sender to one receiver. The relay is considered not only as a sender that helps the message transmission but as a wire-tapper who can obtain some knowledge about the transmitted messages. In this paper we study the coding problem of the relay channel under the situation that some of transmitted messages are con… ▽ More

    Submitted 24 March, 2007; v1 submitted 24 November, 2006; originally announced November 2006.

    Comments: 20 pages, 6 figures, submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security