Results 1 to 10 of about 2,151 (95)
Refinements and Extensions of Ziv’s Model of Perfect Secrecy for Individual Sequences [PDF]
We refine and extend Ziv’s model and results regarding perfectly secure encryption of individual sequences. According to this model, the encrypter and the legitimate decrypter share a common secret key that is not shared with the unauthorized ...
Neri Merhav
doaj +2 more sources
In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.
Jin Liang, Hu Xiaoyan, Wu Jiangxing
doaj +1 more source
Novel Noise Injection Scheme to Guarantee Zero Secrecy Outage under Imperfect CSI
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single-output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel estimation at the legitimate channel to achieve zero secrecy outage probability ...
Hien Q. Ta, Lam Cao, Hoon Oh
doaj +1 more source
On the Beneficial Role of a Finite Number of Scatterers for Wireless Physical Layer Security
We show that for a legitimate communication under multipath quasi-static fading with a reduced number of scatterers, it is possible to achieve perfect secrecy even in the presence of a passive eavesdropper for which no channel state information (CSI) is ...
Pablo Ramirez-Espinosa +2 more
doaj +1 more source
Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability.
Yongho Ko +5 more
doaj +1 more source
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj +1 more source
Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich +2 more
doaj +1 more source
ADDING PERFECT FORWARD SECRECY TO KERBEROS
Kerberos system is a powerful and widely implemented authentication system. Despite this fact it has several problems such as the vulnerability to dictionary attacks which is solved with the use of public key cryptography.
Wameedh Nazar Flayyih
doaj +1 more source
Robust Secure Authentication and Data Storage with Perfect Secrecy
We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view.
Sebastian Baur, Holger Boche
doaj +1 more source
Perfect Secrecy System Based on Chaotic Key Generator
Shannon defines perfect secrecy for a cryptographic system as such a cryptographic system in which the ciphertext yields no possible information about the plaintext.
Mahmood Khalel Ibrahem
doaj +1 more source

