This thesis studies the limitations of incompressible encodings with information- theoretic security. We demonstrate a flaw in the existing proof of the impossibility of constructing incompressible encodings information-theoretically. Our main contribu- tion is a full proof of impossibility of existence of non-trivial information-theoretically secure incompressible encoding schemes. In the first part of the thesis, we introduce the basics of incompressible encodings and provide the necessary definitions. Next, we present the flaws in the existing argument and provide explicit counterexamples to them. Throughout the rest of the thesis, we gradually construct a complete proof. We start by showing the impossibility under a few additional restr...
Abstract. We provide methods for transforming an encryption scheme susceptible to decryption errors ...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
An incompressible encoding can probabilistically encode some data $m$ into a codeword $c$, which is ...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
Abstract: The main problem in designing effective code obfuscation is to guarantee security. State o...
The main problem in designing effective code obfuscation is to guarantee security. State of the art ...
We (once again) refute recurring claims about a public-key encryption scheme that allegedly provides...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
We provide a novel definition of quantitative information flow, called transmissible information, th...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
These lecture notes introduce some basic concepts from Shannon’s information theory, such as (condit...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
textThe importance of constructing reliable and efficient methods for securing digital information i...
textThe importance of constructing reliable and efficient methods for securing digital information i...
Abstract. We provide methods for transforming an encryption scheme susceptible to decryption errors ...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
An incompressible encoding can probabilistically encode some data $m$ into a codeword $c$, which is ...
Incompressibility is a popular security notion for white-box cryptography and captures that a large ...
Abstract: The main problem in designing effective code obfuscation is to guarantee security. State o...
The main problem in designing effective code obfuscation is to guarantee security. State of the art ...
We (once again) refute recurring claims about a public-key encryption scheme that allegedly provides...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
We provide a novel definition of quantitative information flow, called transmissible information, th...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
These lecture notes introduce some basic concepts from Shannon’s information theory, such as (condit...
We investigate an approach to physical-layer security based on the premise that the coding mechanism...
textThe importance of constructing reliable and efficient methods for securing digital information i...
textThe importance of constructing reliable and efficient methods for securing digital information i...
Abstract. We provide methods for transforming an encryption scheme susceptible to decryption errors ...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...