Wiretap channels: Nonasymptotic fundamental limits

W Yang, RF Schaefer, HV Poor - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the maximal secret communication rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New achievability and …

Asymptotic estimates in information theory with non-vanishing error probabilities

VYF Tan - Foundations and Trends® in Communications and …, 2014 - nowpublishers.com
This monograph presents a unified treatment of single-and multi-user problems in
Shannon's information theory where we depart from the requirement that the error …

When are fuzzy extractors possible?

B Fuller, L Reyzin, A Smith - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Fuzzy extractors (Dodis et al., SIAM J. Computing 2008) convert repeated noisy readings of
a high-entropy secret into the same uniformly distributed key. A minimum condition for the …

Communication for generating correlation: A unifying survey

M Sudan, H Tyagi, S Watanabe - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The task of manipulating correlated random variables in a distributed setting has received
attention in the fields of both Information Theory and Computer Science. Often shared …

Converses for secret key agreement and secure computing

H Tyagi, S Watanabe - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
We consider information theoretic secret key (SK) agreement and secure function
computation by multiple parties observing correlated data, with access to an interactive …

[BOK][B] Information-theoretic Cryptography

H Tyagi, S Watanabe - 2023 - books.google.com
This book offers a mathematical foundation for modern cryptography. It is primarily intended
as an introduction for graduate students. Readers should have basic knowledge of …

Universal hashing for information-theoretic security

H Tyagi, A Vardy - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The information-theoretic approach to security entails harnessing the correlated
randomness available in nature to establish security. It uses tools from information theory …

Strong converse using change of measure arguments

H Tyagi, S Watanabe - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The strong converse for a coding theorem shows that the optimal asymptotic rate possible
with vanishing error cannot be improved by allowing a fixed error. Building on a method …

Multiterminal secrecy by public discussion

P Narayan, H Tyagi - Foundations and Trends® in …, 2016 - nowpublishers.com
This monograph describes principles of information theoretic secrecy generation by
legitimate parties with public discussion in the presence of an eavesdropper. The parties are …

Information theory from a functional viewpoint

J Liu - 2018 - search.proquest.com
A perennial theme of information theory is to find new methods to determine the fundamental
limits of various communication systems, which potentially helps the engineers to find better …