Title | Cryptography with information theoretic security |
Publication Type | Conference Paper |
Year of Publication | 2002 |
Authors | Imai, H., Hanaoka, G., Shikata, J., Otsuka, A., Nascimento, A. C. |
Conference Name | Proceedings of the IEEE Information Theory Workshop |
Date Published | oct |
Keywords | Computer graphics, cryptography, cryptosystems, digital signatures, Human Behavior, Information security, information theoretic security, Information theory, long-term security, Metrics, policy-based governance, power system security, Protocols, pubcrawl, quantum computing, Resiliency, Scalability, trusted initializer model, unconditionally secure schemes |
Abstract | Summary form only given. We discuss information-theoretic methods to prove the security of cryptosystems. We study what is called, unconditionally secure (or information-theoretically secure) cryptographic schemes in search for a system that can provide long-term security and that does not impose limits on the adversary's computational power. |
DOI | 10.1109/ITW.2002.1115419 |
Citation Key | imai_cryptography_2002 |