A collaborative PHY-aided technique for end-to-end IoT device authentication

P Hao, X Wang, W Shen - IEEe Access, 2018 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) devices are rapidly proliferating to support a vast number
of end-to-end (E2E) services and applications, which require reliable device authentication …

Information theoretic security for encryption based on conditional Rényi entropies

M Iwamoto, J Shikata - … Security: 7th International Conference, ICITS 2013 …, 2014 - Springer
In this paper, information theoretic cryptography is discussed based on conditional Rényi
entropies. Our discussion focuses not only on cryptography but also on the definitions of …

Security evaluation of y00 protocol based on time-translational symmetry under quantum collective known-plaintext attacks

T Iwakoshi - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we concretely formulate to derive the attacker's success probability of obtaining
the shared secret keys for the Y00 protocol under a combination of a quantum collective …

Guessing probability under unlimited known-plaintext attack on secret keys for Y00 quantum stream cipher by quantum multiple hypotheses testing

T Iwakoshi - Optical Engineering, 2018 - spiedigitallibrary.org
Although quantum key distribution is regarded as promising secure communication, security
of Y00 protocol proposed by Yuen in 2000 for the affinity to conventional optical …

Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption

M Iwamoto, J Shikata - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Abstract Information theoretic cryptography is discussed based on conditional Rényi
entropies. Our discussion focuses not only on cryptography but also on the definitions of …

R\'enyi divergence-based uniformity guarantees for -universal hash functions

M Pathegama, A Barg - arXiv preprint arXiv:2410.16459, 2024 - arxiv.org
Universal hash functions map the output of a source to random strings over a finite alphabet,
aiming to approximate the uniform distribution on the set of strings. A classic result on these …

Secret sharing schemes based on min-entropies

M Iwamoto, J Shikata - 2014 IEEE International Symposium on …, 2014 - ieeexplore.ieee.org
Fundamental results on secret sharing schemes (SSSs) are discussed in the setting where
security and share size are measured by (conditional) min-entropies. We first formalize a …

Comparing security notions of secret sharing schemes

S Dai, D Guo - Entropy, 2015 - mdpi.com
Different security notions of secret sharing schemes have been proposed by different
information measures. Entropies, such as Shannon entropy and min entropy, are frequently …

Bit-error-rate guarantee for quantum key distribution and its characteristics compared to leftover hash lemma

T Iwakoshi - Quantum Information Science and Technology IV, 2018 - spiedigitallibrary.org
The trace distance criterion for security of Quantum Key Distribution (QKD) has been widely
perceived that its upperbound is the maximum failure probability in distributing an ideal …

Security of weak secrets based cryptographic primitives via the Renyi entropy

Y Yao, Z Li - IET Information Security, 2016 - Wiley Online Library
In ideality, cryptographic primitives take for granted that the secret sources are derived from
uniform distribution. However, in reality, we may only obtain some 'weak'random sources …