Strong secrecy

Known as: Strong secret, Weak secrecy, Weak secret 
Strong secrecy is a term used in formal proof-based cryptography for making propositions about the security of cryptographic protocols. It is a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
A security measure called effective security is defined that includes strong secrecy and stealth communication. Effective secrecy… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the… (More)
Is this relevant?
2013
2013
We show strongly secret achievable rate regions for two different wiretap multiple-access channel coding problems. In the first… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density parity-check (LDPC) code ensembles with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
We show that duals of certain low-density parity-check (LDPC) codes, when used in a standard coset coding scheme, provide strong… (More)
  • figure 1
  • figure 2
Is this relevant?
2009
2009
It is known that given the real sum of two independent uniformly distributed lattice points from the same nested lattice codebook… (More)
  • figure 1
Is this relevant?
2008
2008
Recent theoretical a potential to signifi information-theoreti concerns, which we community that a s bits from a block o… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present a new automatic technique for proving strong secrecy for security protocols. Strong secrecy means that an adversary… (More)
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We derive single-letter characterizations of (strong) secrecy capacities for models with an arbitrary number of terminals, each… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to… (More)
Is this relevant?