HR Sadjadpour - 2020 14th International Conference on Signal …, 2020 - ieeexplore.ieee.org
Shannon information theoretic approach to perfect security requires equal number of key bits to the information bits. This fact has been studied for decades and known as" Shannon …
Shannon perfect secrecy, also known as one-time pad, can only be achieved by using exactly a different key bit for each information bit. This requirement makes the …
HR Sadjadpour, SM Ashok - 2021 55th Asilomar Conference on …, 2021 - ieeexplore.ieee.org
We introduce a new protocol that achieves Shannon perfect secrecy performance using significantly lower key size than the original approach of one-time pad. We achieve this goal …
An information theoretic approach to security and privacy for cloud data storage systems is introduced in this paper. The approach called Secure and Private Information Retrieval …
A stolen tablet, a crushed hard drive, a broken telephone-these are the things that modernized terrible dreams are made of. Luckily, while we may lose our equipment, and we …
HR Sadjadpour, MK Kiskani - US Patent 11,334,676, 2022 - Google Patents
Techniques for secure public exposure of digital data include extracting n chunks, each containing Q bits, n= 2 (Q+ 1). A random mapping of each chunk to only one batch of M …
M Patel, R Patel - Data Science and Intelligent Applications: Proceedings …, 2021 - Springer
A stolen tablet, a crushed hard drive, a broken telephone—these are the things that modernized terrible dreams are made of. Luckily, while we may lose our equipment, and we …