Skip to search formSkip to main contentSkip to account menu

Information-theoretic security

Known as: Information-theoretically secure, Perfect secrecy, Information theoretic security 
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security… 
2013
2013
In this paper we investigate a cooperative jamming (CJ) strategy based Stackelberg security game to improve physical layer… 
2012
2012
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel… 
Highly Cited
2011
Highly Cited
2011
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or… 
2010
2010
In this paper we consider the compressive sensing based encryption and proposed the conditions in which the perfect secrecy is… 
2009
2009
We investigate the potential of an information-spectrum approach to information-theoretic security. We show how this approach… 
Highly Cited
2009
Highly Cited
2009
We consider distributed binary detection problems in which the remote sensors of a network implement a censoring strategy to… 
2008
2008
We study the MIMO wiretap channel, a MIMO broadcast channel where the transmitter sends some confidential information to one user… 
2002
2002
Summary form only given. We discuss information-theoretic methods to prove the security of cryptosystems. We study what is called… 
1994
1994
We consider the authentication problem, using the model described by Simmons. Several codes have been constructed using…