Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs
暂无分享,去创建一个
[1] Haim H. Permuter,et al. Semantic-security capacity for wiretap channels of type II , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).
[2] Joseph M. Renes,et al. Noisy Channel Coding via Privacy Amplification and Information Reconciliation , 2010, IEEE Transactions on Information Theory.
[3] Mihir Bellare,et al. Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity , 2012, IACR Cryptol. ePrint Arch..
[4] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[5] N. Katz. An estimate for character sums , 1989 .
[6] Haim H. Permuter,et al. Key and Message Semantic-Security Over State-Dependent Channels , 2020, IEEE Transactions on Information Forensics and Security.
[7] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[8] Masahito Hayashi,et al. General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel , 2006, IEEE Transactions on Information Theory.
[9] Igor Devetak. The private classical capacity and quantum capacity of a quantum channel , 2005, IEEE Transactions on Information Theory.
[10] Masahito Hayashi,et al. Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification , 2009, IEEE Transactions on Information Theory.
[11] Peter Harremoës,et al. Rényi Divergence and Kullback-Leibler Divergence , 2012, IEEE Transactions on Information Theory.
[12] Haim H. Permuter,et al. Arbitrarily Varying Wiretap Channels with Type Constrained States , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[13] F. Chung. Diameters and eigenvalues , 1989 .
[14] Alexander Vardy,et al. Channel upgrading for semantically-secure encryption on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.
[15] Himanshu Tyagi,et al. Universal Hashing for Information-Theoretic Security , 2014, Proceedings of the IEEE.
[16] M. Murty. Ramanujan Graphs , 1965 .
[17] Renato Renner,et al. Smooth Renyi entropy and applications , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[18] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[19] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[20] Ling Liu,et al. Achieving Secrecy Capacity of the Gaussian Wiretap Channel With Polar Lattices , 2015, IEEE Transactions on Information Theory.
[21] Renato Renner,et al. Simple and Tight Bounds for Information Reconciliation and Privacy Amplification , 2005, ASIACRYPT.
[22] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[23] Noga Alon,et al. On the second eigenvalue of a graph , 1991, Discret. Math..
[24] J. Massey,et al. Communications and Cryptography: Two Sides of One Tapestry , 1994 .
[25] Holger Boche,et al. Semantic Security for Quantum Wiretap Channels , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).
[26] Slawomir Stanczak,et al. The MAC Resolvability Region, Semantic Security and Its Operational Implications , 2017, ArXiv.
[27] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[28] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[29] Riccardo Pucella. Review of Foundations of Cryptography II : Basic Applications ∗ , 2005 .
[30] Masahito Hayashi,et al. Security analysis of ε-almost dual universal 2 hash functions , 2014 .
[31] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[32] Matthieu R. Bloch,et al. Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.
[33] U. Maurer. The Strong Secret Key Rate of Discrete Random Triples , 1994 .
[34] Nathan Linial,et al. Lifts, Discrepancy and Nearly Optimal Spectral Gap* , 2006, Comb..
[35] N. Linial,et al. Expander Graphs and their Applications , 2006 .
[36] Michael B. Cohen,et al. Ramanujan Graphs in Polynomial Time , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[37] Sergio Verdú,et al. Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.
[38] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[39] John Odentrantz,et al. Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues , 2000, Technometrics.
[40] W. Li,et al. Spectra of Hypergraphs and Applications , 1996 .
[41] Masahito Hayashi,et al. Secure multiplex coding with dependent and non-uniform multiple messages , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[42] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[43] S. Rajsbaum. Foundations of Cryptography , 2014 .
[44] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[45] Moritz Wiese,et al. A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.
[46] Nikhil Srivastava,et al. Interlacing Families I: Bipartite Ramanujan Graphs of All Degrees , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[47] Alexander Vardy,et al. A Cryptographic Treatment of the Wiretap Channel , 2012, IACR Cryptol. ePrint Arch..