A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
From MaRDI portal
Publication:2279660
DOI10.1016/j.ins.2016.03.049zbMath1427.94079OpenAlexW2328722604WikidataQ122271877 ScholiaQ122271877MaRDI QIDQ2279660
Yahya S. Khiabani, Shuangqing Wei
Publication date: 13 December 2019
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2016.03.049
Rényi entropyequivocationrandomness extractor\(L_{1}\) norm distancesecrecy exponentuniversal\(_{2}\) hash functions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On measures of information and their characterizations
- Universal classes of hash functions
- Extracting randomness: A survey and new constructions
- Universal hashing and authentication codes
- An approach for stream ciphers design based on joint computing over random and secret data
- Semantic Security for the Wiretap Channel
- More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function
- Rényi Divergence and Kullback-Leibler Divergence
- Universal Compression of Memoryless Sources Over Unknown Alphabets
- Applications of LDPC Codes to the Wiretap Channel
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- The Wire-Tap Channel
- Broadcast channels with confidential messages
- Renyi's entropy and the probability of error
- Random ciphering bounds on a class of secrecy systems and discrete message sources
- Common randomness in information theory and cryptography. I. Secret sharing
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- Generalized privacy amplification
- True Random Number Generators Secure in a Changing Environment
- Conditional Rényi Entropies
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
This page was built for publication: A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage