H Zhou, A El Gamal - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
Shannon showed that to achieve perfect secrecy in point-to-point communication, the message rate cannot exceed the shared secret key rate giving rise to the simple one-time …
S Liu, Y Hong, E Viterbo - 2014 IEEE Information Theory …, 2014 - ieeexplore.ieee.org
While information-theoretic security is stronger than computational security, it has long been considered impractical. In this work, we provide new insights into the design of practical …
SW Ho, T Chan, C Uduwerelle - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Shannon's fundamental bound for perfect secrecy says that the entropy of the secret message U cannot be larger than the entropy of the secret key R shared by the sender and …
C Chan, A Al-Bashabsheh… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
We study the rate of change of the multivariate mutual information among a set of random variables when some common randomness is added to or removed from a subset. This is …
B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information theory. We show how entropy has find its way from thermodynamics into information theory …
N Merhav - IEEE Transactions on Information Theory, 2003 - ieeexplore.ieee.org
We consider the Shannon cipher system with a variable key rate, and study the necessary and sufficient conditions for perfect secrecy in the sense that the exponential rate of the …
Randomness plays a central role in computer science, in particular cryptography. Almost all cryptographic primitives depend crucially on randomness because randomness and …
Perfect secrecy describes cases where an adversary cannot learn anything about the secret beyond its prior distribution. A classical result by Shannon shows that a necessary condition …
M Hayashi - arXiv preprint arXiv:1010.1358, 2010 - researchgate.net
We adopt L1 distance as Eve's distinguishability in secret key generation from a common random number without communication. Under this secrecy criterion, using the Rényi …