International audiencePreserving the privacy of private communication is a fundamental concern of computing addressed by encryption. Information-theoretic reasoning models unconditional security where the strength of the results is not moderated by computational hardness or unproven results. Perfect secrecy is often considered the ideal result for a cryptosystem, where knowledge of the ciphertext reveals no information about the message or key, however often this is impossible to achieve in practice. An alternative measure is the equivocation, intuitively the average number of message/key pairs that could have produced a given ciphertext. We show a theoretical bound on equivocation called max-equivocation and show that this generalizes perf...
We study the problem of “privacy amplification”: key agreement between two parties who both know a w...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Recent work has presented max-equivocation as a measure of the resistance of a cryptosystem to attac...
In the spirit of Shannon s theory of secrecy systems we analyse several possible natural definitons ...
We address security and privacy problems for digital devices and biometrics from an information-theo...
We study the problem of “privacy amplification”: key agreement between two parties who both know a w...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
Preserving the privacy of private communication is a fundamental concern of computing addressed by e...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
International audiencePreserving the privacy of private communication is a fundamental concern of co...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
We present information-theoretic definitions and results for analyzing symmetric-key encryption sch...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
Recent work has presented max-equivocation as a measure of the resistance of a cryptosystem to attac...
In the spirit of Shannon s theory of secrecy systems we analyse several possible natural definitons ...
We address security and privacy problems for digital devices and biometrics from an information-theo...
We study the problem of “privacy amplification”: key agreement between two parties who both know a w...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
Information-theoretic cryptography is full of open problems with a communication-complexity flavor. ...