On the Shannon perfect secrecy result

HR Sadjadpour - 2020 14th International Conference on Signal …, 2020 - ieeexplore.ieee.org
Shannon information theoretic approach to perfect security requires equal number of key
bits to the information bits. This fact has been studied for decades and known as" Shannon …

Network information theoretic security

H Zhou, A El Gamal - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
Shannon showed that to achieve perfect secrecy in point-to-point communication, the
message rate cannot exceed the shared secret key rate giving rise to the simple one-time …

On measures of information theoretic security

S Liu, Y Hong, E Viterbo - 2014 IEEE Information Theory …, 2014 - ieeexplore.ieee.org
While information-theoretic security is stronger than computational security, it has long been
considered impractical. In this work, we provide new insights into the design of practical …

Error-free perfect-secrecy systems

SW Ho, T Chan, C Uduwerelle - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Shannon's fundamental bound for perfect secrecy says that the entropy of the secret
message U cannot be larger than the entropy of the secret key R shared by the sender and …

Incremental and decremental secret key agreement

C Chan, A Al-Bashabsheh… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
We study the rate of change of the multivariate mutual information among a set of random
variables when some common randomness is added to or removed from a subset. This is …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …

A large-deviations notion of perfect secrecy

N Merhav - IEEE Transactions on Information Theory, 2003 - ieeexplore.ieee.org
We consider the Shannon cipher system with a variable key rate, and study the necessary
and sufficient conditions for perfect secrecy in the sense that the exponential rate of the …

[PDF][PDF] New notions of secrecy and user generated randomness in Cryptography

M Alimomeni - 2014 - prism.ucalgary.ca
Randomness plays a central role in computer science, in particular cryptography. Almost all
cryptographic primitives depend crucially on randomness because randomness and …

Relative perfect secrecy: Universally optimal strategies and channel design

MHR Khouzani, P Malacaria - 2016 IEEE 29th Computer …, 2016 - ieeexplore.ieee.org
Perfect secrecy describes cases where an adversary cannot learn anything about the secret
beyond its prior distribution. A classical result by Shannon shows that a necessary condition …

[PDF][PDF] Tight exponential evaluation for information theoretical secrecy based on l1 distance,”

M Hayashi - arXiv preprint arXiv:1010.1358, 2010 - researchgate.net
We adopt L1 distance as Eve's distinguishability in secret key generation from a common
random number without communication. Under this secrecy criterion, using the Rényi …