Results 1 to 10 of about 95,453 (277)
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things [PDF]
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks
Abid Rauf +3 more
doaj +2 more sources
Security of Quantum Key Distribution
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Horace P. Yuen
doaj +3 more sources
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks † [PDF]
In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to ...
Bagus Santoso, Yasutada Oohama
doaj +2 more sources
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks † [PDF]
In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks.
Bagus Santoso, Yasutada Oohama
doaj +2 more sources
E - Capacity - Equivocation Region of Wiretap Channel [PDF]
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj +3 more sources
Bit Security Estimation Using Various Information-Theoretic Measures
In this paper, we propose various quantitative information-theoretic bit security reduction measures that correlate the statistical difference between two probability distributions with the security level gap for two cryptographic schemes.
Dong-Hoon Lee +2 more
doaj +1 more source
In this paper, we concretely formulate to derive the attacker's success probability of obtaining the shared secret keys for the Y00 protocol under a combination of a quantum collective attack with infinitely-long known-plaintext, naming it “ ...
Takehisa Iwakoshi
doaj +1 more source
Efficient Threshold Function Secret Sharing With Information-Theoretic Security
Function secret sharing (FSS) is a cryptographic primitive that is introduced by Boyle et al. (Eurocrypt 2015), motivated by application scenarios involving private access to large distributed data while minimising the overhead of communication, for ...
Jinglong Luo +3 more
doaj +1 more source
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding.
Wulich Dov, Tsouri GillR
doaj +2 more sources
Unconditionally Secure Quantum Signatures
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered
Ryan Amiri, Erika Andersson
doaj +1 more source

