Skip to search formSkip to main contentSkip to account menu

Information-theoretic security

Known as: Information-theoretically secure, Perfect secrecy, Information theoretic security 
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Quantum key distribution is a way to distribute secret keys to distant users with information theoretic security and key rates… 
Highly Cited
2013
Highly Cited
2013
Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer… 
Highly Cited
2008
Highly Cited
2008
A discrete memoryless multiple-access channel (MAC) with confidential messages is studied, where two users attempt to transmit… 
Highly Cited
2008
Highly Cited
2008
  • Y. RachlinD. Baron
  • 2008
  • Corpus ID: 686532
Results in compressed sensing describe the feasibility of reconstructing sparse signals using a small number of linear… 
Highly Cited
2008
Highly Cited
2008
The problem of securing a network coding communication system against an eavesdropper is considered. The network implements… 
Highly Cited
2007
Highly Cited
2007
This paper considers the problem of secure coding design for a type II wiretap channel, where the main channel is noiseless and… 
Highly Cited
2007
Highly Cited
2007
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike… 
Highly Cited
2006
Highly Cited
2006
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is… 
2002
2002
This paper presents essentially optimal lower bounds on the size of linear codes C : {0, 1}n ? {0, 1}m which have the property… 
Highly Cited
2001
Highly Cited
2001
We study the question of how to generically compose symmetric encryption and authentication when building "secure channels" for…