Mosaics of combinatorial designs for information-theoretic security
DOI10.1007/S10623-021-00994-1zbMATH Open1485.05021arXiv2102.00983OpenAlexW3126620907WikidataQ114849814 ScholiaQ114849814MaRDI QIDQ2115738FDOQ2115738
Publication date: 21 March 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2102.00983
Recommendations
- Combinatorial designs for authentication and secrecy codes
- Combinatorial designs and cryptography, revisited
- scientific article; zbMATH DE number 446495
- Theory of combinatorial designs with applications to encryption and the design of experiments
- Jordan derivations on prime rings
- A construction for authentication/secrecy codes from certain combinatorial designs
- scientific article; zbMATH DE number 4057437
- The combinatorics of authentication and secrecy codes
- scientific article; zbMATH DE number 1342086
- Information-theoretically secure protocols and security under composition
balanced incomplete block designgroup divisible designwiretap channelsemantic securityprivacy amplificationmosaic of designs
Information theory (general) (94A15) Combinatorial aspects of block designs (05B05) Other designs, configurations (05B30) Channel models (including quantum) in information and communication theory (94A40) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- Computational Complexity
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Generalized privacy amplification
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- Privacy Amplification by Public Discussion
- Title not available (Why is that?)
- Rényi Divergence and Kullback-Leibler Divergence
- Universal hashing and authentication codes
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Almost independence of random variables and capacity of a secrecy channel
- Information-theoretic key agreement: from weak to strong secret for free
- Some maximal arcs in finite projective planes
- \(t{1\over 2}\)-designs
- Combinatorial techniques for universal hashing
- Mosaics of combinatorial designs
- Tiling groups with difference sets
- Combinatorial Properties of Group Divisible Incomplete Block Designs
- Semantic Security for the Wiretap Channel
- Invertible Extractors and Wiretap Protocols
- On coloured constant composition designs
- Security Analysis of <inline-formula> <tex-math notation="LaTeX">$\varepsilon $ </tex-math> </inline-formula>-Almost Dual Universal2Hash Functions: Smoothing of Min Entropy Versus Smoothing of Rényi Entropy of Order 2
- Secure Multiplex Coding With Dependent and Non-Uniform Multiple Messages
- Title not available (Why is that?)
- Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs
Cited In (1)
This page was built for publication: Mosaics of combinatorial designs for information-theoretic security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2115738)