Information-theoretic security

Known as: Information-theoretically secure, Perfect secrecy, Information theoretic security 
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1968-2018
05010019682018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and… (More)
  • table 1
  • figure 2
  • figure 3
  • table 2
  • table 3
Is this relevant?
2015
2015
Infrastructural systems such as the electricity grid, healthcare, and transportation networks today rely increasingly on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol which… (More)
Is this relevant?
2012
2012
We present the notion of continuous non-malleable codes along with an instantiation and we show how to use them to securely… (More)
Is this relevant?
2011
2011
Quantum key distribution is renowned for information-theoretic security on point-to-point connections, while it is by itself not… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Review
2009
Review
2009
The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tap… (More)
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 2.1
  • figure 2.2
Is this relevant?
2009
2009
We investigate the potential of an information-spectrum approach to information-theoretic security. We show how this approach… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants… (More)
Is this relevant?