Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Information-Theoretic Cryptography

biblio

Visible to the public The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency

Submitted by grigby1 on Wed, 06/02/2021 - 12:30pm
  • Complexity theory
  • Computational modeling
  • Control Theory
  • Cryptographic Protocols
  • Cryptography
  • Human behavior
  • Information-Theoretic Cryptography
  • Protocols
  • pubcrawl
  • resilience
  • Resiliency
  • Round Complexity
  • Scalability
  • Secure computation
  • security
  • Task Analysis
biblio

Visible to the public Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography

Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
  • probability
  • information theoretic security
  • unconditional security
  • symmetric-key encryption
  • Shannon's perfect secrecy
  • security quantities
  • security formalizations
  • relaxed perfect secrecy
  • perfect secrecy
  • information-theoretic indistinguishability
  • Information-Theoretic Cryptography
  • composable security
  • semantic security
  • Indistinguishability
  • Semantics
  • Scalability
  • key agreement
  • information-theoretic security
  • Entropy
  • Metrics
  • policy-based governance
  • pubcrawl
  • Human behavior
  • Resiliency
  • Protocols
  • Cryptographic Protocols
  • telecommunication security
  • secret keys
  • private key cryptography
  • encryption
biblio

Visible to the public Breaking the Circuit-Size Barrier in Secret Sharing

Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
  • pubcrawl
  • composability
  • Compositionality
  • Information-Theoretic Cryptography
  • secret sharing
  • theoretical cryptography

Terms of Use  |  ©2023. CPS-VO