On Measures of Information Theoretic Security

被引:0
|
作者
Liu, Shuiyin [1 ]
Hong, Yi [1 ]
Viterbo, Emanuele [1 ]
机构
[1] Monash Univ, ECSE Dept, Melbourne, Vic 3800, Australia
关键词
WIRETAP CHANNEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While information-theoretic security is stronger than computational security, it has long been considered impractical. In this work, we provide new insights into the design of practical information-theoretic cryptosystems. Firstly, from a theoretical point of view, we give a brief introduction into the existing information theoretic security criteria, such as the notions of Shannon's perfect/ideal secrecy in cryptography, and the concept of strong secrecy in coding theory. Secondly, from a practical point of view, we propose the concept of ideal secrecy outage and define a outage probability. Finally, we show how such probability can be made arbitrarily small in a practical cryptosystem.
引用
收藏
页码:309 / 310
页数:2
相关论文
共 50 条
  • [31] Estimation of Information Theoretic Measures on the Ising Model
    Razak, Fatimah Abdul
    Jensen, Henrik Jeldtoft
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES, 2014, 1602 : 56 - 61
  • [32] Universal Hashing for Information-Theoretic Security
    Tyagi, Himanshu
    Vardy, Alexander
    [J]. PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1781 - 1795
  • [33] Information-theoretic measures for anomaly detection
    Lee, W
    Xiang, D
    [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 130 - 143
  • [34] Information theoretic measures of perinatal cardiotocography synchronization
    Warrick, Philip A.
    Hamilton, Emily F.
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (03) : 2179 - 2192
  • [35] Information-theoretic measures of hyperspherical harmonic
    Dehesa, J. S.
    Lopez-Rosa, S.
    Yanez, R. J.
    [J]. JOURNAL OF MATHEMATICAL PHYSICS, 2007, 48 (04)
  • [36] ON CHARACTERIZATION OF USEFUL INFORMATION-THEORETIC MEASURES
    PARKASH, O
    SINGH, RS
    [J]. KYBERNETIKA, 1987, 23 (03) : 245 - 251
  • [37] Information Theoretic Security Based on Bounded Observability
    Muramatsu, Jun
    Yoshimura, Kazuyuki
    Davis, Peter
    [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 128 - 139
  • [38] Wireless Information-Theoretic Security in MANETs
    Chrysikos, Theofilos
    Dagiuklas, Tasos
    Kotsopoulos, Stavros
    Dagiuklas, Tasos
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 692 - 696
  • [39] Nested QPSK Encoding for Information Theoretic Security
    Rendon, Gregory T.
    Harrison, Willie K.
    Gomes, Marco A. C.
    Vilela, Joao P.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [40] On Information Theoretic Security: Mathematical Models and Techniques
    Csiszar, Imre
    [J]. INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 73 - 75