On information theoretic security: Mathematical models and techniques(Invited Talk)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Some key results about information theoretic secrecy will be surveyed, both for scenarios without and with public communication. Attention is focused on fundamental limits, and on the underlying proof techniques. This talk is based on the chapter on information theoretic security of the book [5].

Original languageEnglish
Title of host publicationInformation Theoretic Security - 5th International Conference, ICITS 2011, Proceedings
Pages73-75
Number of pages3
DOIs
Publication statusPublished - May 26 2011
Event5th International Conference on Information Theoretic Security, ICITS 2011 - Amsterdam, Netherlands
Duration: May 21 2011May 24 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6673 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Information Theoretic Security, ICITS 2011
CountryNetherlands
CityAmsterdam
Period5/21/115/24/11

    Fingerprint

Keywords

  • Common randomness
  • correlated sources
  • extractor
  • memoryless channel
  • privacy amplification
  • public discussion
  • secrecy capacity
  • security index

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Csiszár, I. (2011). On information theoretic security: Mathematical models and techniques(Invited Talk). In Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings (pp. 73-75). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6673 LNCS). https://doi.org/10.1007/978-3-642-20728-0_7