Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,700 papers from all fields of science
Search
Sign In
Create Free Account
Information-theoretic security
Known as:
Information-theoretically secure
, Perfect secrecy
, Information theoretic security
Expand
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Adversary (cryptography)
Attack model
Ciphertext
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound
K. Tamaki
,
H. Lo
,
Wenyuan Wang
,
Marco Lucamarini
2018
Corpus ID: 51692797
Quantum key distribution is a way to distribute secret keys to distant users with information theoretic security and key rates…
Expand
Highly Cited
2013
Highly Cited
2013
Dhwani: secure peer-to-peer acoustic NFC
R. Nandakumar
,
Krishna Chintalapudi
,
V. Padmanabhan
,
R. Venkatesan
Conference on Applications, Technologies…
2013
Corpus ID: 9852446
Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer…
Expand
Highly Cited
2008
Highly Cited
2008
Multiple-Access Channels With Confidential Messages
Yingbin Liang
,
H. Poor
IEEE Transactions on Information Theory
2008
Corpus ID: 15327756
A discrete memoryless multiple-access channel (MAC) with confidential messages is studied, where two users attempt to transmit…
Expand
Highly Cited
2008
Highly Cited
2008
The secrecy of compressed sensing measurements
Y. Rachlin
,
D. Baron
46th Annual Allerton Conference on Communication…
2008
Corpus ID: 686532
Results in compressed sensing describe the feasibility of reconstructing sparse signals using a small number of linear…
Expand
Highly Cited
2008
Highly Cited
2008
Universal Secure Network Coding via Rank-Metric Codes
Danilo Silva
,
F. Kschischang
IEEE Transactions on Information Theory
2008
Corpus ID: 14940797
The problem of securing a network coding communication system against an eavesdropper is considered. The network implements…
Expand
Highly Cited
2007
Highly Cited
2007
Secure Nested Codes for Type II Wiretap Channels
Ruoheng Liu
,
Yingbin Liang
,
H. Poor
,
P. Spasojevic
IEEE Information Theory Workshop
2007
Corpus ID: 14629929
This paper considers the problem of secure coding design for a type II wiretap channel, where the main channel is noiseless and…
Expand
Highly Cited
2007
Highly Cited
2007
The Wiretap Channel With Feedback: Encryption Over the Channel
L. Lai
,
H. E. Gamal
,
H. Poor
IEEE Transactions on Information Theory
2007
Corpus ID: 8298959
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike…
Expand
Highly Cited
2006
Highly Cited
2006
Information-theoretically secure protocols and security under composition
E. Kushilevitz
,
Yehuda Lindell
,
T. Rabin
Symposium on the Theory of Computing
2006
Corpus ID: 6307496
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is…
Expand
2002
2002
Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes
K. Obata
International Workshop Randomization and…
2002
Corpus ID: 2163624
This paper presents essentially optimal lower bounds on the size of linear codes C : {0, 1}n ? {0, 1}m which have the property…
Expand
Highly Cited
2001
Highly Cited
2001
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
H. Krawczyk
Annual International Cryptology Conference
2001
Corpus ID: 15684686
We study the question of how to generically compose symmetric encryption and authentication when building "secure channels" for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required