Results 1 to 10 of about 95,453 (277)

Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things [PDF]

open access: yesSensors, 2020
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks
Abid Rauf   +3 more
doaj   +2 more sources

Security of Quantum Key Distribution

open access: yesIEEE Access, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Horace P. Yuen
doaj   +3 more sources

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks [PDF]

open access: yesEntropy, 2019
In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to ...
Bagus Santoso, Yasutada Oohama
doaj   +2 more sources

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks [PDF]

open access: yesEntropy, 2019
In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks.
Bagus Santoso, Yasutada Oohama
doaj   +2 more sources

E - Capacity - Equivocation Region of Wiretap Channel [PDF]

open access: yesJournal of Universal Computer Science, 2021
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj   +3 more sources

Bit Security Estimation Using Various Information-Theoretic Measures

open access: yesIEEE Access, 2021
In this paper, we propose various quantitative information-theoretic bit security reduction measures that correlate the statistical difference between two probability distributions with the security level gap for two cryptographic schemes.
Dong-Hoon Lee   +2 more
doaj   +1 more source

Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry Under Quantum Collective Known-Plaintext Attacks

open access: yesIEEE Access, 2021
In this paper, we concretely formulate to derive the attacker's success probability of obtaining the shared secret keys for the Y00 protocol under a combination of a quantum collective attack with infinitely-long known-plaintext, naming it “ ...
Takehisa Iwakoshi
doaj   +1 more source

Efficient Threshold Function Secret Sharing With Information-Theoretic Security

open access: yesIEEE Access, 2020
Function secret sharing (FSS) is a cryptographic primitive that is introduced by Boyle et al. (Eurocrypt 2015), motivated by application scenarios involving private access to large distributed data while minimising the overhead of communication, for ...
Jinglong Luo   +3 more
doaj   +1 more source

Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding.
Wulich Dov, Tsouri GillR
doaj   +2 more sources

Unconditionally Secure Quantum Signatures

open access: yesEntropy, 2015
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered
Ryan Amiri, Erika Andersson
doaj   +1 more source

Home - About - Disclaimer - Privacy