搜索结果: 1-6 共查到“Information Theoretic Security”相关记录6条 . 查询时间(0.046 秒)
Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
Information Conservational Security Data Compression Quantum-Fuzzy Collective Precision
2018/11/16
Whereas it is widely deemed an impossible task to scale One-Time Pad (OTP) without sacrificing information theoretic security or network traffic, this paper presents a paradigm of Scalable OneTime Pad...
ICITS 2016:9th International Conference on Information Theoretic Security
Key message rates
2016/7/19
This is the ninth in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptography. ICITS covers all aspe...
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
Impossibility Symmetric-key Encryption
2014/3/11
In this paper, information theoretic cryptography is discussed based on conditional Renyi entropies. Our discussion focuses not only on cryptography but also on the denitions of conditional Renyi e...
The Throughput Cost of Information-Theoretic Security in Decentralized Wireless Networks
Throughput Cost of Information-Theoretic Security Decentralized Wireless Networks
2011/2/24
This paper studies the throughput of large-scale decentralized wireless networks with informationtheoretic security constraints.
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Privacy preserving Set operations Multiparty Computation
2009/7/14
In this paper, we focus on the specific problems of Private Matching, Set Disjointness and
Cardinality Set Intersection in information theoretic settings. Specifically, we give perfectly secure proto...
Combining Computational and Information-Theoretic Security in Multi-Party Computation
multi-party computation information-theoretic security computational security
2009/6/11
Most protocols for multi-party computation (MPC) are secure either
against information-theoretic (IT) or against computationally bounded adversaries.
In this work, we bring together the best of both...