Information Theoretic Security


We present the notion of continuous non-malleable codes along with an instantiation and we show how to use them to securely compute any keyed cryptographic primitive on a computational architecture with a single constant size untamperable CPU and a tamperable and leaky memory in which both the secret key and the program of the cryptographic primitive is… (More)
DOI: 10.1007/978-3-319-17470-9

Cite this paper

@inproceedings{Lehmann2012InformationTS, title={Information Theoretic Security}, author={Anja Lehmann and Stefan Wolf and Gerhard Goos and Juris Hartmanis and Jan van Leeuwen}, booktitle={Lecture Notes in Computer Science}, year={2012} }