A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when theâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

Review

2016

Review

2016

- Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
- Proceedings of the IEEE
- 2016

Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized andâ€¦Â (More)

Is this relevant?

2015

2015

- Parv Venkitasubramaniam, Jiyun Yao, Parth Pradhan
- Proceedings of the IEEE
- 2015

Infrastructural systems such as the electricity grid, healthcare, and transportation networks today rely increasingly on theâ€¦Â (More)

Is this relevant?

2013

2013

- Theofilos Chrysikos, Tasos Dagiuklas, Stavros A. Kotsopoulos
- 2013 IEEE International Conference onâ€¦
- 2013

In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of nonâ€¦Â (More)

Is this relevant?

2013

2013

- Oleksandr Nikitin
- ArXiv
- 2013

We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol whichâ€¦Â (More)

Is this relevant?

2012

2012

- Anja Lehmann, Stefan Wolf, Gerhard Goos, Juris Hartmanis, Jan van Leeuwen
- Lecture Notes in Computer Science
- 2012

We present the notion of continuous non-malleable codes along with an instantiation and we show how to use them to securelyâ€¦Â (More)

Is this relevant?

2011

2011

- Stefan Rass
- 2011

Quantum key distribution is renowned for information-theoretic security on point-to-point connections, while it is by itself notâ€¦Â (More)

Is this relevant?

Review

2009

Review

2009

- Yingbin Liang, H. Vincent Poor, Shlomo Shamai
- Foundations and Trends in Communications andâ€¦
- 2009

The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tapâ€¦Â (More)

Is this relevant?

2009

2009

- Matthieu R. Bloch, J. Nicholas Laneman
- 2009 Information Theory and Applications Workshop
- 2009

We investigate the potential of an information-spectrum approach to information-theoretic security. We show how this approachâ€¦Â (More)

Is this relevant?

Highly Cited

2008

Highly Cited

2008

- Matthieu R. Bloch, JoÃ£o Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin
- IEEE Transactions on Information Theory
- 2008

This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulationâ€¦Â (More)

Is this relevant?

2007

2007

- Anne Broadbent, Alain Tapp
- ASIACRYPT
- 2007

We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participantsâ€¦Â (More)

Is this relevant?