Information-theoretically secure keyless authentication

被引:4
|
作者
Korjik, V [1 ]
Bakin, M [1 ]
机构
[1] Inst Politecn Nacl, CINVESTAV, Mexico City 07000, DF, Mexico
关键词
D O I
10.1109/ISIT.2000.866310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:20 / 20
页数:1
相关论文
共 50 条
  • [1] Information-Theoretically Secure Entity Authentication in the Multi-user Setting
    Hajime, Shogo
    Watanabe, Yohei
    Shikata, Junji
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417
  • [2] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
    Seito, Takenobu
    Aikawa, Tadashi
    Shikata, Junji
    Matsumoto, Tsutomu
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 148 - 165
  • [3] Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
    Nikolopoulos, Georgios M.
    Fischlin, Marc
    [J]. CRYPTOGRAPHY, 2020, 4 (04) : 1 - 10
  • [4] Information-Theoretically Secure Key Generation and Management
    Yang, En-Hui
    Wu, Xin-Wen
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
  • [5] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 635 - 652
  • [6] On Optimal Information-Theoretically Secure Key Management
    Yang, En-Hui
    Wu, Xin-Wen
    [J]. 2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
  • [7] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
  • [8] Parallel reducibility for information-theoretically secure computation
    Dodis, Y
    Micali, S
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92
  • [9] Information-Theoretically Secure Erasure Codes for Distributed Storage
    Rashmi, K. V.
    Shah, Nihar B.
    Ramchandran, Kannan
    Kumar, P. Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) : 1621 - 1646
  • [10] Amortized Complexity of Information-Theoretically Secure MPC Revisited
    Cascudo, Ignacio
    Cramer, Ronald
    Xing, Chaoping
    Yuan, Chen
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 395 - 426