Skip to search formSkip to main contentSkip to account menu

Information-theoretic security

Known as: Information-theoretically secure, Perfect secrecy, Information theoretic security 
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security… 
2013
2013
One of the finest approach for achieving the perfect security is the time variant key or variable key from session to session or… 
2013
2013
In this paper we investigate a cooperative jamming (CJ) strategy based Stackelberg security game to improve physical layer… 
2012
2012
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel… 
2011
2011
Unbreakable encryption is theoretically possible but perfect operation is difficult. It is expected that DNA-based cryptography… 
2010
2010
In this paper we consider the compressive sensing based encryption and proposed the conditions in which the perfect secrecy is… 
2009
2009
We investigate the potential of an information-spectrum approach to information-theoretic security. We show how this approach… 
2008
2008
We study the MIMO wiretap channel, a MIMO broadcast channel where the transmitter sends some confidential information to one user… 
Highly Cited
2007
Highly Cited
2007
  • L. LaiH. E. Gamal
  • 2007
  • Corpus ID: 16620487
This paper investigates the role of user cooperation in facilitating secure wireless communications. In particular, the four… 
2002
2002
Summary form only given. We discuss information-theoretic methods to prove the security of cryptosystems. We study what is called…