[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Information-Theoretic Cryptography: A Maneuver in the Trade-Off Space of Cryptography in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter discusses the reason why we have chosen to study perfectly secure
cryptography (as a branch of information-theoretic cryptography) among the existing …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …

Combinatorial Cryptography and Latin Squares

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first overview the applications of combinatorics in cryptography. Then, we
take look at some historical applications of non-combinatorial squares and cubes in …

On the Shannon perfect secrecy result

HR Sadjadpour - 2020 14th International Conference on Signal …, 2020 - ieeexplore.ieee.org
Shannon information theoretic approach to perfect security requires equal number of key
bits to the information bits. This fact has been studied for decades and known as" Shannon …

[图书][B] Information Theoretic Security

A Smith - 2012 - Springer
ICITS 2012 was the 6th International Conference of Information-theoretic Security, held at
the Université de Montréal in Montreal, Quebec, Canada, during August 15–17, 2012. ICITS …

Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n< 2k-1 (full paper)

AAAM Kamal, K Iwamura - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Typically, when secrecy multiplication is performed in multiparty computation using Shamir's
(k, n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead …

On measures of information theoretic security

S Liu, Y Hong, E Viterbo - 2014 IEEE Information Theory …, 2014 - ieeexplore.ieee.org
While information-theoretic security is stronger than computational security, it has long been
considered impractical. In this work, we provide new insights into the design of practical …

[图书][B] Information security and cryptology

D Lin, M Yung, J Zhou - 2015 - Springer
This volume contains the papers presented at Inscrypt 2014: The 10th China International
Conference on Information Security and Cryptology held during December 13–15, 2014 in …