Results 51 to 60 of about 95,937 (277)
Experimental Guesswork with Quantum Side Information Using Twisted Light
Guesswork is an information–theoretic quantity which can be seen as an alternate security criterion to entropy. Recent work has established the theoretical framework for guesswork in the presence of quantum side information, which we extend both ...
Vishal Katariya +2 more
doaj +1 more source
Imaging of Biphoton States: Fundamentals and Applications
Quantum states of two photons exhibit a rich polarization and spatial structure, which provides a fundamental resource of strongly correlated and entangled states. This review analyzes the physics of these intriguing properties and explores the various techniques and technologies available to measure them, including the state of the art of their ...
Alessio D'Errico, Ebrahim Karimi
wiley +1 more source
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security [PDF]
We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and
Calmon, Flavio du Pin +5 more
core +1 more source
An Elementary Completeness Proof for Secure Two-Party Computation Primitives
In the secure two-party computation problem, two parties wish to compute a (possibly randomized) function of their inputs via an interactive protocol, while ensuring that neither party learns more than what can be inferred from only their own input and ...
Ishwar, Prakash +2 more
core +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy and
Willie K. Harrison +6 more
doaj +1 more source
A Distortion Based Approach for Protecting Inferences
Eavesdropping attacks in inference systems aim to learn not the raw data, but the system inferences to predict and manipulate system actions. We argue that conventional information security measures can be ambiguous on the adversary's estimation ...
Agarwal, Gaurav Kumar +3 more
core +1 more source
Information Theoretically Secure Databases
16 pages, 2 ...
Valiant, Gregory, Valiant, Paul
openaire +2 more sources
Bioprosthetic aortic valves have revolutionized the treatment of aortic stenosis, but their durability is limited by structural valve deterioration (SVD). This review focuses on the pericardial tissue at the heart of these valves, examining how its mechanical properties and calcification drive fatigue and failure.
Gabriele Greco +7 more
wiley +1 more source
On formal verification of arithmetic-based cryptographic primitives
Cryptographic primitives are fundamental for information security: they are used as basic components for cryptographic protocols or public-key cryptosystems.
A.C. Yao +11 more
core +1 more source

