Skip to main content

On Information Theoretic Security: Mathematical Models and Techniques

(Invited Talk)

  • Conference paper
Information Theoretic Security (ICITS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6673))

Included in the following conference series:

  • 631 Accesses

Abstract

Some key results about information theoretic secrecy will be surveyed, both for scenarios without and with public communication. Attention is focused on fundamental limits, and on the underlying proof techniques. This talk is based on the chapter on information theoretic security of the book [5].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahlswede, R., Csiszár, I.: Common Randomness in Information Theory and Cryptography. Part 1, Secret Sharing. IEEE Trans. Inform. Theory 39, 1121–1132 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  2. Ahlswede, R., Csiszár, I.: Common Randomness in Information Theory and Cryptography. Part 2, CR Capacity. IEEE Trans. Inform. Theory 44, 225–240 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy Amplification by Public Discussion. SIAM J. Comput. 17, 210–229 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  4. Csiszár, I., Körner, J.: Broadcast Channels with Confidential Messages. IEEE Trans. Inform. Theory 24, 339–348 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  5. Csiszár, I., Körner, J.: Information Theory: Coding Theorems for Discrete Memoryless Systems, 2nd edn. Cambridge University Press, Cambridge (2011)

    Book  MATH  Google Scholar 

  6. Csiszár, I., Narayan, P.: The Secret Key Capacity for Multiple Terminals. IEEE Trans. Inform. Theory 50, 3047–3061 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  7. Csiszár, I., Narayan, P.: Secrecy Capacities for Multiterminal Channel Models. IEEE Trans. Inform. Theory 54, 2437–2452 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  8. Gohari, A.A., Anantharam, V.: Information-Theoretic Key Agreement of Multiple Terminals, Parts I-II. IEEE Trans. Inform. Theory 56, 3973–3996, 3997–4010 (2010)

    Google Scholar 

  9. Liang, Y., Somekh-Baruch, A., Poor, V., Shamai, S., Verdú, S.: Capacity of Cognitive Interference Channels With and Without Secrecy. IEEE Trans. Inform. Theory 55, 619–694 (2009)

    MathSciNet  MATH  Google Scholar 

  10. Maurer, U.M.: Secret Key Agreement by Public Discussion from Common Information. IEEE Trans. Inform. Theory 39, 733–743 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  11. Maurer, U.M.: The Strong Secret Key of Discrete Random Triples. In: Blahut, R.E., Costello, J., Maurer, U., Mittelholzer, T. (eds.) Communication and Cryptography - Two Sides of One Tapestry, pp. 271–285. Kluwer, Dordrecht (1994)

    Chapter  Google Scholar 

  12. Maurer, U.M., Wolf, S.: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351–368. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  14. Wyner, A.D.: The Wiretap Channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Csiszár, I. (2011). On Information Theoretic Security: Mathematical Models and Techniques. In: Fehr, S. (eds) Information Theoretic Security. ICITS 2011. Lecture Notes in Computer Science, vol 6673. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20728-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20728-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20727-3

  • Online ISBN: 978-3-642-20728-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics