Randomness and Secrecy - A Brief Introduction
نویسنده
چکیده
We give a brief introduction to probabilistic encryptions. This serves as an example how randomness plays a pivotal role in cryptographic systems that satisfy advanced security concepts.
منابع مشابه
Classical-quantum arbitrarily varying wiretap channel: Ahlswede dichotomy, positivity, resources, super-activation
We establish the Ahlswede dichotomy for arbitrarily varying classicalquantum wiretap channels, i.e., either the deterministic secrecy capacity of the channel is zero, or it equals its randomness-assisted secrecy capacity. We analyze the secrecy capacity of these channels when the sender and the receiver use various resources. It turns out that randomness, common randomness, and correlation as r...
متن کاملAn Introduction to Secrecy Capacity
This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits on the amount of information that can be reliably communicated in such a way that a malevolent third-party observer cannot decode the messages. This situation is considered first for a system with a single intended receiver, and then extensions of se...
متن کاملA Simplified Coding Scheme for the Broadcast Channel with Complementary Receiver Side Information under Individual Secrecy Constraints
This paper simplifies an existing coding scheme for the two-receiver discrete memoryless broadcast channel with complementary receiver side information where there is a passive eavesdropper and individual secrecy is required. The existing coding scheme is simplified in two steps by replacing Wyner’s secrecy coding with Carleial-Hellman’s secrecy coding as well as removing additional randomness ...
متن کاملPolar Coding for the Cognitive Interference Channel with Confidential Messages
In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the cognitive interference channel with confidential messages (CICC) under the strong secrecy criterion. Existing polar coding schemes for interference channels rely on the use of polar codes for the multiple access channel, the code construction problem of which can be complicated. We show that the w...
متن کاملInformation-theoretic Cryptography
In 1949, Shannon published the paper ”Communication theory of secrecy systems”. This constituted a foundational treatment and analysis of encryption systems. He transferred the methods of information theory, originally developed as a mathematical model for communication over ”noisy” channels to the setting of cryptosystems. We give a brief introduction into his most outstanding ideas, such as t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. UCS
دوره 12 شماره
صفحات -
تاریخ انتشار 2006