We provide a novel definition of quantitative information flow, called transmissible information, that is suitable for reasoning about informational-theoretically secure (or non-cryptographic) systems, as well as about cryptographic systems with their polynomially bounded adversaries, error probabilities, etc. Transmissible information captures deliberate communication between two processes, and it safely over-approximates the quantity of information that a process unintentionally leaks to another process. We show that transmissible information is preserved under universal composability, which constitutes the prevalent cryptographic notion of a secure implementation. This result enables us to lift quantitative bounds of transmissible inform...
We consider a secure verification problem in which Alice wants to verify whether her signal X¡n ¿ is...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
We discuss the setting of information-theoretically secure channel protocols where confidentiality o...
We discuss the setting of information-theoretically secure channel protocols where confidentiality o...
These lecture notes introduce some basic concepts from Shannon’s information theory, such as (condit...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
We discuss the setting of information-theoretically secure channel protocols where confidentiality o...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...
One big problem of the communication between two parties is the secrecy. That means how much informa...
The main problem addressed by this thesis is that of characterising information leakage channels in...
We consider a secure verification problem in which Alice wants to verify whether her signal X¡n ¿ is...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
We discuss the setting of information-theoretically secure channel protocols where confidentiality o...
We discuss the setting of information-theoretically secure channel protocols where confidentiality o...
These lecture notes introduce some basic concepts from Shannon’s information theory, such as (condit...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
We discuss the setting of information-theoretically secure channel protocols where confidentiality o...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...
One big problem of the communication between two parties is the secrecy. That means how much informa...
The main problem addressed by this thesis is that of characterising information leakage channels in...
We consider a secure verification problem in which Alice wants to verify whether her signal X¡n ¿ is...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...