Results 1 to 10 of about 95,453 (278)

Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things [PDF]

open access: yesSensors, 2020
As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks
Abid Rauf   +3 more
doaj   +2 more sources

Security of Quantum Key Distribution

open access: yesIEEE Access, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Horace P. Yuen
doaj   +3 more sources

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks [PDF]

open access: yesEntropy, 2019
In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to ...
Bagus Santoso, Yasutada Oohama
doaj   +2 more sources

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks [PDF]

open access: yesEntropy, 2019
In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks.
Bagus Santoso, Yasutada Oohama
doaj   +2 more sources

Information-Theoretic Security for the Masses [PDF]

open access: yes, 2013
We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol which allows bootstrapping an IT-secure and PF-secure channel from a memorizable shared secret.
Nikitin, Oleksandr
core   +2 more sources

E - Capacity - Equivocation Region of Wiretap Channel [PDF]

open access: yesJournal of Universal Computer Science, 2021
One of the problems of information - theoretic security concerns secure communication over a wiretap channel. The aim in the general wiretap channel model is to maximize the rate of the reliable communication from the source to the legitimate receiver ...
Mariam Haroutunian
doaj   +3 more sources

Bit Security Estimation Using Various Information-Theoretic Measures

open access: yesIEEE Access, 2021
In this paper, we propose various quantitative information-theoretic bit security reduction measures that correlate the statistical difference between two probability distributions with the security level gap for two cryptographic schemes.
Dong-Hoon Lee   +2 more
doaj   +1 more source

Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry Under Quantum Collective Known-Plaintext Attacks

open access: yesIEEE Access, 2021
In this paper, we concretely formulate to derive the attacker's success probability of obtaining the shared secret keys for the Y00 protocol under a combination of a quantum collective attack with infinitely-long known-plaintext, naming it “ ...
Takehisa Iwakoshi
doaj   +1 more source

Network Information Theoretic Security [PDF]

open access: yes2020 IEEE International Symposium on Information Theory (ISIT), 2020
Shannon showed that to achieve perfect secrecy in point-to-point communication, the message rate cannot exceed the shared secret key rate giving rise to the simple one-time pad encryption scheme. In this paper, we extend this work from point-to-point to networks. We consider a connected network with pairwise communication between the nodes.
Zhou, Hongchao, Gamal, Abbas El
openaire   +2 more sources

Efficient Threshold Function Secret Sharing With Information-Theoretic Security

open access: yesIEEE Access, 2020
Function secret sharing (FSS) is a cryptographic primitive that is introduced by Boyle et al. (Eurocrypt 2015), motivated by application scenarios involving private access to large distributed data while minimising the overhead of communication, for ...
Jinglong Luo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy