搜索结果: 1-4 共查到“军队指挥学 Information-theoretic security”相关记录4条 . 查询时间(0.078 秒)
Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
Information Conservational Security Data Compression Quantum-Fuzzy Collective Precision
2018/11/16
Whereas it is widely deemed an impossible task to scale One-Time Pad (OTP) without sacrificing information theoretic security or network traffic, this paper presents a paradigm of Scalable OneTime Pad...
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
Impossibility Symmetric-key Encryption
2014/3/11
In this paper, information theoretic cryptography is discussed based on conditional Renyi entropies. Our discussion focuses not only on cryptography but also on the denitions of conditional Renyi e...
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Privacy preserving Set operations Multiparty Computation
2009/7/14
In this paper, we focus on the specific problems of Private Matching, Set Disjointness and
Cardinality Set Intersection in information theoretic settings. Specifically, we give perfectly secure proto...
Combining Computational and Information-Theoretic Security in Multi-Party Computation
multi-party computation information-theoretic security computational security
2009/6/11
Most protocols for multi-party computation (MPC) are secure either
against information-theoretic (IT) or against computationally bounded adversaries.
In this work, we bring together the best of both...