Keyword : information theoretic security


Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage
Yohei WATANABE Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6 ; pp. 1097-1106
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
broadcast encryptionkey predistribution systemsinformation theoretic securityunconditional security
 Summary | Full Text:PDF

Unconditionally Secure Oblivious Transfer from Algebraic Signaling over the Gaussian Channel
Motohiko ISAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 2017-2025
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
oblivious transferinformation theoretic securityAWGN channelgeometrically uniform partition
 Summary | Full Text:PDF

Oblivious Transfer from the Additive White Gaussian Noise Channel
Motohiko ISAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/02/01
Vol. E93-A  No. 2 ; pp. 516-525
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
oblivious transferadditive white Gaussian noise channelinformation theoretic securityoblivious transfer rate
 Summary | Full Text:PDF

Hash Functions and Information Theoretic Security
Nasour BAGHERI Lars R. KNUDSEN Majid NADERI Sφren S. THOMSEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/12/01
Vol. E92-A  No. 12 ; pp. 3401-3403
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
hash functionsinformation theoretic securityquery complexitypermutation-based hash functions
 Summary | Full Text:PDF

Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model
Masashi NAITO Shun WATANABE Ryutaroh MATSUMOTO Tomohiko UYEMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/02/01
Vol. E92-A  No. 2 ; pp. 525-534
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
advantage distillationAWGNinformation theoretic securitykey agreementprivacy amplificationpublic discussion
 Summary | Full Text:PDF

Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Kaoru KUROSAWA Kazuhiro SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 105-112
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
private and reliable transmissioninformation theoretic securitycommunication efficiency
 Summary | Full Text:PDF

An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability
Akira OTSUKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 140-148
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic cashinformation theoretic securityunconditionally secure signature
 Summary | Full Text:PDF