[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

An infinite perfect-secrecy system with non-uniformly distributed keys

C Tian, G Chen - Journal of Information Security and Applications, 2022 - Elsevier
Based on some recent results derived from the Shannon theory of secrecy systems, this
paper develops a new mathematical model for an infinite cryptosystem with perfect secrecy …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …

A new security scheme for cloud storage systems and its performance evaluation using avalanche effect

HR Sadjadpour, SM Ashok - 2021 55th Asilomar Conference on …, 2021 - ieeexplore.ieee.org
We introduce a new protocol that achieves Shannon perfect secrecy performance using
significantly lower key size than the original approach of one-time pad. We achieve this goal …

[PDF][PDF] Understanding Polynomial Maps over Finite Fields

A Dukes, G Micheli - CrypTorino 2021, 2024 - iris.unito.it
Ring signatures, introduced by Ron Rivest, Adi Shamir and Yael Tauman [7], allow a signer
to produce a signature on behalf of a group of users, called ring, while the signature hides …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …