Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,322 papers from all fields of science
Search
Sign In
Create Free Account
Information-theoretic security
Known as:
Information-theoretically secure
, Perfect secrecy
, Information theoretic security
Expand
A cryptosystem is information-theoretically secure if its security derives purely from information theory. That is, it cannot be broken even when the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Adversary (cryptography)
Attack model
Ciphertext
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
New Techniques for Generating of Automatic Variable Key in Achieving Perfect Security
R. Goswami
,
S. K. Chakraborty
,
A. Bhunia
,
C. Bhunia
Journal of The Institution of Engineers (India…
2014
Corpus ID: 62672058
In realizing the time variant key or variable key from session to session is the key challenge in achieving perfect security…
Expand
2013
2013
A Stackelberg security game with cooperative jamming over a multiuser OFDMA network
An Wang
,
Yueming Cai
,
Wendong Yang
,
Zhao Hou
IEEE Wireless Communications and Networking…
2013
Corpus ID: 1461541
In this paper we investigate a cooperative jamming (CJ) strategy based Stackelberg security game to improve physical layer…
Expand
2012
2012
Some New Results on the Wiretap Channel with Side Information
Bin Dai
,
Yuan Luo
Entropy
2012
Corpus ID: 18014889
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel…
Expand
Highly Cited
2011
Highly Cited
2011
Implementation of terminal middleware platform for mobile RFID computing
Namje Park
International Journal of Ad Hoc and Ubiquitous…
2011
Corpus ID: 13639317
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or…
Expand
2010
2010
Perfect secrecy via compressed sensing
M. Mayiami
,
B. Seyfe
,
Hamid G. Bafghi
Iran Workshop on Communication and Information…
2010
Corpus ID: 9722575
In this paper we consider the compressive sensing based encryption and proposed the conditions in which the perfect secrecy is…
Expand
2009
2009
Information-spectrum methods for information-theoretic security
M. Bloch
,
J. N. Laneman
Information Theory and Applications Workshop
2009
Corpus ID: 2836833
We investigate the potential of an information-spectrum approach to information-theoretic security. We show how this approach…
Expand
Highly Cited
2009
Highly Cited
2009
Distributed Detection With Censoring Sensors Under Physical Layer Secrecy
S. Maranò
,
V. Matta
,
P. Willett
IEEE Transactions on Signal Processing
2009
Corpus ID: 16631069
We consider distributed binary detection problems in which the remote sensors of a network implement a censoring strategy to…
Expand
2008
2008
The MIMO wiretap channel
F. Oggier
,
B. Hassibi
International Symposium on Communications…
2008
Corpus ID: 13935856
We study the MIMO wiretap channel, a MIMO broadcast channel where the transmitter sends some confidential information to one user…
Expand
2002
2002
Cryptography with information theoretic security
H. Imai
,
Goichiro Hanaoka
,
Junji Shikata
,
Akira Otsuka
,
Anderson C. A. Nascimento
Proceedings of the IEEE Information Theory…
2002
Corpus ID: 64270511
Summary form only given. We discuss information-theoretic methods to prove the security of cryptosystems. We study what is called…
Expand
1994
1994
A shift register construction of unconditionally secure authentication codes
T. Johansson
Des. Codes Cryptogr.
1994
Corpus ID: 26767643
We consider the authentication problem, using the model described by Simmons. Several codes have been constructed using…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE