Results 1 to 10 of about 95,937 (276)

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks [PDF]

open access: yesEntropy, 2019
In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to ...
Bagus Santoso, Yasutada Oohama
doaj   +4 more sources

Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things [PDF]

open access: yesSensors, 2020
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks
Abid Rauf   +3 more
doaj   +2 more sources

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks [PDF]

open access: yesEntropy, 2019
In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks.
Bagus Santoso, Yasutada Oohama
doaj   +2 more sources

E - Capacity - Equivocation Region of Wiretap Channel [PDF]

open access: yesJournal of Universal Computer Science, 2021
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj   +3 more sources

Bit Security Estimation Using Various Information-Theoretic Measures

open access: yesIEEE Access, 2021
In this paper, we propose various quantitative information-theoretic bit security reduction measures that correlate the statistical difference between two probability distributions with the security level gap for two cryptographic schemes.
Dong-Hoon Lee   +2 more
doaj   +1 more source

Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry Under Quantum Collective Known-Plaintext Attacks

open access: yesIEEE Access, 2021
In this paper, we concretely formulate to derive the attacker's success probability of obtaining the shared secret keys for the Y00 protocol under a combination of a quantum collective attack with infinitely-long known-plaintext, naming it “ ...
Takehisa Iwakoshi
doaj   +1 more source

Network Information Theoretic Security [PDF]

open access: yes2020 IEEE International Symposium on Information Theory (ISIT), 2020
Shannon showed that to achieve perfect secrecy in point-to-point communication, the message rate cannot exceed the shared secret key rate giving rise to the simple one-time pad encryption scheme. In this paper, we extend this work from point-to-point to networks. We consider a connected network with pairwise communication between the nodes.
Zhou, Hongchao, Gamal, Abbas El
openaire   +2 more sources

Information Theoretic Secure Aggregation With User Dropouts [PDF]

open access: yesIEEE Transactions on Information Theory, 2021
In the robust secure aggregation problem, a server wishes to learn and only learn the sum of the inputs of a number of users while some users may drop out (i.e., may not respond). The identity of the dropped users is not known a priori and the server needs to securely recover the sum of the remaining surviving users.
Yizhou Zhao, Hua Sun
openaire   +2 more sources

Efficient Threshold Function Secret Sharing With Information-Theoretic Security

open access: yesIEEE Access, 2020
Function secret sharing (FSS) is a cryptographic primitive that is introduced by Boyle et al. (Eurocrypt 2015), motivated by application scenarios involving private access to large distributed data while minimising the overhead of communication, for ...
Jinglong Luo   +3 more
doaj   +1 more source

Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

open access: yesEURASIP Journal on Wireless Communications and Networking, 2009
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding.
Wulich Dov, Tsouri GillR
doaj   +2 more sources

Home - About - Disclaimer - Privacy