Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation
From MaRDI portal
Publication:6070448
DOI10.1007/s00145-023-09482-2zbMath1527.94047OpenAlexW4387735652MaRDI QIDQ6070448
Amit Sahai, Alexis Korb, Paul Lou, Yuval Ishai
Publication date: 21 November 2023
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-023-09482-2
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Communication theory (94A05) Source coding (94A29)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- Computational fuzzy extractors
- A fuzzy vault scheme
- Reusable Fuzzy Extractors for Low-Entropy Distributions
- Practical Multilinear Maps over the Integers
- Semantic Security for the Wiretap Channel
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Key agreement from weak bit agreement
- On Best-Possible Obfuscation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- The Wire-Tap Channel
- Broadcast channels with confidential messages
- Secret key agreement by public discussion from common information
- Candidate Multilinear Maps from Ideal Lattices
- Capacity Regions of Two New Classes of Two-Receiver Broadcast Channels
- Elements of Information Theory
- Broadcast channels
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
- Obfuscation for Evasive Functions
- Indistinguishability obfuscation from well-founded assumptions
- Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation
This page was built for publication: Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation