Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,507,434 papers from all fields of science
Search
Sign In
Create Free Account
Information-theoretic security
Known as:
Information-theoretically secure
, Perfect secrecy
, Information theoretic security
Expand
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Adversary (cryptography)
Attack model
Ciphertext
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Private information retrieval with side information: The single server case
S. Kadhe
,
B. Garcia
,
A. Heidarzadeh
,
S. E. Rouayheb
,
A. Sprintson
Allerton Conference on Communication, Control…
2017
Corpus ID: 26811192
We study the problem of Private Information Retrieval (PIR) in the presence of prior side information. The problem setup includes…
Expand
2014
2014
New Techniques for Generating of Automatic Variable Key in Achieving Perfect Security
R. Goswami
,
S. K. Chakraborty
,
A. Bhunia
,
C. Bhunia
Journal of The Institution of Engineers (India…
2014
Corpus ID: 62672058
In realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security…
Expand
2013
2013
A Stackelberg security game with cooperative jamming over a multiuser OFDMA network
An Wang
,
Yueming Cai
,
Wendong Yang
,
Zhao Hou
IEEE Wireless Communications and Networking…
2013
Corpus ID: 1461541
In this paper we investigate a cooperative jamming (CJ) strategy based Stackelberg security game to improve physical layer…
Expand
2012
2012
Some New Results on the Wiretap Channel with Side Information
Bin Dai
,
Yuan Luo
Entropy
2012
Corpus ID: 18014889
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel…
Expand
2011
2011
Analysis on Secure and Effective Applications of a DNA-Based Cryptosystem
M. Hirabayashi
,
A. Nishikawa
,
Fumiaki Tanaka
,
M. Hagiya
,
H. Kojima
,
K. Oiwa
Sixth International Conference on Bio-Inspired…
2011
Corpus ID: 18794566
Unbreakable encryption is theoretically possible but perfect operation is difficult. It is expected that DNA-based cryptography…
Expand
2010
2010
Perfect secrecy via compressed sensing
M. Mayiami
,
B. Seyfe
,
Hamid G. Bafghi
Iran Workshop on Communication and Information…
2010
Corpus ID: 9722575
In this paper we consider the compressive sensing based encryption and proposed the conditions in which the perfect secrecy is…
Expand
Review
2010
Review
2010
New trust based security approach for ad-hoc networks
S. Sharma
,
Renu Mishra
,
Inderpreet Kaur
International Conference on Computer Science and…
2010
Corpus ID: 1135124
Secure routing is the milestone in mobile ad hoc networks. Ad hoc networks are widely used in military and other scientific areas…
Expand
2009
2009
Information-spectrum methods for information-theoretic security
M. Bloch
,
J. N. Laneman
Information Theory and Applications Workshop
2009
Corpus ID: 2836833
We investigate the potential of an information-spectrum approach to information-theoretic security. We show how this approach…
Expand
2008
2008
The MIMO wiretap channel
F. Oggier
,
B. Hassibi
International Symposium on Communications…
2008
Corpus ID: 13935856
We study the MIMO wiretap channel, a MIMO broadcast channel where the transmitter sends some confidential information to one user…
Expand
2002
2002
Cryptography with information theoretic security
H. Imai
,
Goichiro Hanaoka
,
Junji Shikata
,
Akira Otsuka
,
Anderson C. A. Nascimento
Proceedings of the IEEE Information Theory…
2002
Corpus ID: 64270511
Summary form only given. We discuss information-theoretic methods to prove the security of cryptosystems. We study what is called…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE