Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation
From MaRDI portal
Publication:6162057
DOI10.1007/978-3-031-15979-4_20zbMath1517.94013MaRDI QIDQ6162057
Yuval Ishai, Paul Lou, Amit Sahai, Alexis Korb
Publication date: 28 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40) Communication theory (94A05)
Related Items (3)
Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation ⋮ The pseudorandom oracle model and ideal obfuscation ⋮ Computational wiretap coding from indistinguishability obfuscation
Cites Work
- Unnamed Item
- Probabilistic encryption
- Reusable fuzzy extractors for low-entropy distributions
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- Computational fuzzy extractors
- A fuzzy vault scheme
- Practical Multilinear Maps over the Integers
- Semantic Security for the Wiretap Channel
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- On Best-Possible Obfuscation
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- The Wire-Tap Channel
- Broadcast channels with confidential messages
- Secret key agreement by public discussion from common information
- Candidate Multilinear Maps from Ideal Lattices
- Capacity Regions of Two New Classes of Two-Receiver Broadcast Channels
- Elements of Information Theory
- Broadcast channels
- Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
- Obfuscation for Evasive Functions
- Indistinguishability obfuscation from well-founded assumptions
This page was built for publication: Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation