[HTML][HTML] The odyssey of entropy: Cryptography

B Zolfaghari, K Bibak, T Koshiba - Entropy, 2022 - mdpi.com
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …

Common information, noise stability, and their extensions

L Yu, VYF Tan - Foundations and Trends® in …, 2022 - nowpublishers.com
Common information is ubiquitous in information theory and related areas such as
theoretical computer science and discrete probability. However, because there are multiple …

Improved non-malleable extractors, non-malleable codes and independent source extractors

X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …

Non-malleable extractors and codes, with their many tampered extensions

E Chattopadhyay, V Goyal, X Li - Proceedings of the forty-eighth annual …, 2016 - dl.acm.org
Randomness extractors and error correcting codes are fundamental objects in computer
science. Recently, there have been several natural generalizations of these objects, in the …

Collusion resistant traitor tracing from learning with errors

R Goyal, V Koppula, B Waters - Proceedings of the 50th annual ACM …, 2018 - dl.acm.org
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially
in log (n) where n is the number of users and prove it secure under the Learning with Errors …

A unified approach to deterministic encryption: New constructions and a connection to computational entropy

B Fuller, A O'neill, L Reyzin - Journal of Cryptology, 2015 - Springer
This paper addresses deterministic public-key encryption schemes (DE), which are
designed to provide meaningful security when only source of randomness in the encryption …

Leakage-resilient cryptography from minimal assumptions

C Hazay, A López-Alt, H Wee, D Wichs - Journal of Cryptology, 2016 - Springer
We present new constructions of leakage-resilient cryptosystems, which remain provably
secure even if the attacker learns some arbitrary partial information about their internal …

Information theoretic security for encryption based on conditional Rényi entropies

M Iwamoto, J Shikata - … Security: 7th International Conference, ICITS 2013 …, 2014 - Springer
In this paper, information theoretic cryptography is discussed based on conditional Rényi
entropies. Our discussion focuses not only on cryptography but also on the definitions of …

Cryptanalysis via algebraic spans

A Ben-Zvi, A Kalka, B Tsaban - … in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
We introduce a method for obtaining provable polynomial time solutions of problems in
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …

Rényi resolvability and its applications to the wiretap channel

L Yu, VYF Tan - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
The conventional channel resolvability problem refers to the determination of the minimum
rate required for an input process so that the output distribution approximates a target …