A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
DOI10.1016/J.INS.2016.03.049zbMATH Open1427.94079OpenAlexW2328722604WikidataQ122271877 ScholiaQ122271877MaRDI QIDQ2279660FDOQ2279660
Authors: Yahya S. Khiabani, Shuangqing Wei
Publication date: 13 December 2019
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2016.03.049
Recommendations
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- Privacy amplification with asymptotically optimal entropy loss
- Privacy amplification with asymptotically optimal entropy loss
- Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications
- Privacy amplification from non-malleable codes
- On Privacy Amplification, Lossy Compression, and Their Duality to Channel Coding
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages
- Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs
equivocationrandomness extractor\(L_{1}\) norm distancesecrecy exponentuniversal\(_{2}\) hash functionsRényi entropy
Cites Work
- Title not available (Why is that?)
- Universal classes of hash functions
- Title not available (Why is that?)
- Generalized privacy amplification
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- On measures of information and their characterizations
- Rényi Divergence and Kullback-Leibler Divergence
- Broadcast channels with confidential messages
- Renyi's entropy and the probability of error
- Conditional Rényi Entropies
- Universal hashing and authentication codes
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Information-theoretic key agreement: from weak to strong secret for free
- The Wire-Tap Channel
- Common randomness in information theory and cryptography. I. Secret sharing
- Extracting randomness: A survey and new constructions
- Title not available (Why is that?)
- Cryptographic extraction and key derivation: the HKDF scheme
- Universal Compression of Memoryless Sources Over Unknown Alphabets
- An approach for stream ciphers design based on joint computing over random and secret data
- Semantic security for the wiretap channel
- Applications of LDPC Codes to the Wiretap Channel
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications
- True random number generators secure in a changing environment.
- More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function
- Title not available (Why is that?)
- Random ciphering bounds on a class of secrecy systems and discrete message sources
Cited In (1)
This page was built for publication: A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2279660)