We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and another akin to ratedistortion theory. We start by presenting a new information-theoretic metric for security, called ǫ-symbol secrecy, and derive associated fundamental bounds. This metric provides a parameterization of secrecy that spans other information-theoretic metrics for security, such as weak secrecy and perfect secrecy. We then introduce list-source codes (LSCs), which are a general framework for mapping a key length (entropy) to a list size that an eavesdropper has to reso...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present a new information-theoretic definition and associated results, based on list decoding in ...
We present a new information-theoretic definition and associated results, based on list decoding in...
We present a new information-theoretic definition and associated results, based on list decoding in...
We present a new information-theoretic definition and associated results, based on list decoding in...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and stud...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present a new information-theoretic definition and associated results, based on list decoding in ...
We present a new information-theoretic definition and associated results, based on list decoding in...
We present a new information-theoretic definition and associated results, based on list decoding in...
We present a new information-theoretic definition and associated results, based on list decoding in...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and stud...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Abstract In this paper, we provide secrecy metrics applicable to physical-layer coding techniques wi...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...