메뉴 건너뛰기




Volumn 8317 LNCS, Issue , 2014, Pages 103-121

Information theoretic security for encryption based on conditional rényi entropies

Author keywords

(Conditional) R nyi entropy; Error probability in guessing; Impossibility; Information theoretic cryptography; Symmetric key encryption

Indexed keywords

CRYPTOGRAPHY; ENTROPY; INFORMATION THEORY; PROBABILITY;

EID: 84958540075     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-04268-8_7     Document Type: Conference Paper
Times cited : (62)

References (33)
  • 1
    • 84894116979 scopus 로고    scopus 로고
    • Information theoretic security for encryption based on conditional Renyi entropies
    • Iwamoto, M., Shikata, J.: Information theoretic security for encryption based on conditional Renyi entropies. IACR Cryptology ePrint Archive, 2013/440 (2013)
    • (2013) IACR Cryptology EPrint Archive, 2013/440
    • Iwamoto, M.1    Shikata, J.2
  • 2
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • Shannon, C.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379-423 (1948)
    • (1948) Bell Syst. Tech. J. , vol.273 , Issue.3 , pp. 379-423
    • Shannon, C.1
  • 3
    • 84980082105 scopus 로고
    • Transmission of information
    • Hartley, R.V.L.: Transmission of information. Bell Syst. Tech. J. 7(3), 535-563 (1928)
    • (1928) Bell Syst. Tech. J. , vol.7 , Issue.3 , pp. 535-563
    • Hartley, R.V.L.1
  • 5
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication theory of secrecy systems. Bell Tech. J. 28, 656-715 (1949)
    • (1949) Bell Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 6
    • 84865034944 scopus 로고    scopus 로고
    • Shannon impossibility, revisited
    • Smith, A. (ed.) ICITS 2012 Springer, Heidelberg
    • Dodis, Y.: Shannon impossibility, revisited. In: Smith, A. (ed.) ICITS 2012. LNCS, vol. 7412, pp. 100-110. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7412 , pp. 100-110
    • Dodis, Y.1
  • 7
    • 84865014320 scopus 로고    scopus 로고
    • Guessing secrecy
    • Smith, A. (ed.) ICITS 2012 Springer, Heidelberg
    • Alimomeni, M., Safavi-Naini, R.: Guessing secrecy. In: Smith, A. (ed.) ICITS 2012. LNCS, vol. 7412, pp. 1-13. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7412 , pp. 1-13
    • Alimomeni, M.1    Safavi-Naini, R.2
  • 10
    • 33747650890 scopus 로고
    • Information measures and capacity of order α for discrete memoryless channels
    • Topics in Information Theory
    • Arimoto, S.: Information measures and capacity of order α for discrete memoryless channels. Colloquia Mathematica Societatis János Bolyai, 16. Topics in Information Theory 41-52 (1975)
    • (1975) Colloquia Mathematica Societatis János Bolyai , vol.16 , pp. 41-52
    • Arimoto, S.1
  • 11
    • 79957636296 scopus 로고    scopus 로고
    • Exponential decreasing rate of leaked information in universal random privacy amplification
    • Hayashi, M.: Exponential decreasing rate of leaked information in universal random privacy amplification. IEEE Trans. Inf. Theory 57(6), 3989-4001 (2011)
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.6 , pp. 3989-4001
    • Hayashi, M.1
  • 12
    • 0343104838 scopus 로고
    • Class notes for transmission of information (course 6.574)
    • Cambridge.
    • Fano, R.M.: Class notes for transmission of information (course 6.574). Technical report, MIT, Cambridge. (1952)
    • (1952) Technical Report, MIT
    • Fano, R.M.1
  • 13
    • 77951624674 scopus 로고    scopus 로고
    • Channel coding rate in the finite blocklength regime
    • Polyanskiy, Y., Poor, V., Verdú, S.: Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 56(5), 2307-2359 (2010)
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.5 , pp. 2307-2359
    • Polyanskiy, Y.1    Poor, V.2    Verdú, S.3
  • 16
    • 3042858195 scopus 로고    scopus 로고
    • Generalized statistics: Yet another generalization
    • Jizba, P., Arimitsu, T.: Generalized statistics: yet another generalization. Phys. A 340, 110-116 (2004)
    • (2004) Phys. A , vol.340 , pp. 110-116
    • Jizba, P.1    Arimitsu, T.2
  • 17
    • 3142672769 scopus 로고    scopus 로고
    • The world according to Rényi: Thermodynamics of multifractal systems
    • DOI 10.1016/j.aop.2004.01.002, PII S0003491604000132
    • Jizba, P., Arimitsu, T.: The world according to Rényi: thermodynamics of multifractal systems. Ann. Phys. 312, 17-59 (2004) (Pubitemid 38939247)
    • (2004) Annals of Physics , vol.312 , Issue.1 , pp. 17-59
    • Jizba, P.1    Arimitsu, T.2
  • 22
    • 0018020371 scopus 로고
    • Polymatroidal dependence structure of a set of random variables
    • Fujishige, S.: Polymatroidal dependence structure of a set of random variables. Inf. Control 39, 55-72 (1978) (Pubitemid 9408951)
    • (1978) Inf Control , vol.39 , Issue.1 , pp. 55-72
    • Fujishige, S.1
  • 23
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004 Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 25
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 27
    • 84873970779 scopus 로고    scopus 로고
    • Overcoming weak expectations
    • Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
    • Dodis, Y., Yu, Y.: Overcoming weak expectations. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 1-22. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 1-22
    • Dodis, Y.1    Yu, Y.2
  • 28
    • 84866642869 scopus 로고    scopus 로고
    • PUFs: Myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon
    • Prouff, E., Schaumont, P. (eds.) CHES 2012 Springer, Heidelberg
    • Katzenbeisser, S., Kocabaş, U., Rozić, V., Sadeghi, A.-R., Verbauwhede, I.,Wachsmann, C.: PUFs: myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 283-301. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7428 , pp. 283-301
    • Katzenbeisser, S.1    Kocabaş, U.2    Rozić, V.3    Sadeghi, A.-R.4    Verbauwhede, I.5    Wachsmann, C.6
  • 29
    • 0029732887 scopus 로고    scopus 로고
    • An inequality on guessing and its application to sequential decoding
    • PII S0018944896000338
    • Arikan, E.: An inequality on guessing and its application to sequential decoding. IEEE Trans. Inf. Theory 42(1), 99-105 (1996) (Pubitemid 126775660)
    • (1996) IEEE Transactions on Information Theory , vol.42 , Issue.1 , pp. 99-105
    • Arikan, E.1
  • 30
    • 77951101999 scopus 로고    scopus 로고
    • New coding theorems for fixed-length source coding and Shannon's cipher system with a general source
    • December
    • Koga, H.: New coding theorems for fixed-length source coding and Shannon's cipher system with a general source. In: ISITA2008, pp. 251-256, December 2008
    • (2008) ISITA2008 , pp. 251-256
    • Koga, H.1
  • 32
    • 77955614196 scopus 로고    scopus 로고
    • Smooth Rényi entropy and its applications
    • June-July
    • Renner, R., Wolf, S.: Smooth Rényi entropy and its applications. In: ISIT2004, p. 232, June-July, 2004
    • (2004) ISIT2004 , pp. 232
    • Renner, R.1    Wolf, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.