A collaborative PHY-aided technique for end-to-end IoT device authentication
Nowadays, Internet of Things (IoT) devices are rapidly proliferating to support a vast number
of end-to-end (E2E) services and applications, which require reliable device authentication …
of end-to-end (E2E) services and applications, which require reliable device authentication …
Information theoretic security for encryption based on conditional Rényi entropies
M Iwamoto, J Shikata - … Security: 7th International Conference, ICITS 2013 …, 2014 - Springer
In this paper, information theoretic cryptography is discussed based on conditional Rényi
entropies. Our discussion focuses not only on cryptography but also on the definitions of …
entropies. Our discussion focuses not only on cryptography but also on the definitions of …
Security evaluation of y00 protocol based on time-translational symmetry under quantum collective known-plaintext attacks
T Iwakoshi - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we concretely formulate to derive the attacker's success probability of obtaining
the shared secret keys for the Y00 protocol under a combination of a quantum collective …
the shared secret keys for the Y00 protocol under a combination of a quantum collective …
Guessing probability under unlimited known-plaintext attack on secret keys for Y00 quantum stream cipher by quantum multiple hypotheses testing
T Iwakoshi - Optical Engineering, 2018 - spiedigitallibrary.org
Although quantum key distribution is regarded as promising secure communication, security
of Y00 protocol proposed by Yuen in 2000 for the affinity to conventional optical …
of Y00 protocol proposed by Yuen in 2000 for the affinity to conventional optical …
Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption
M Iwamoto, J Shikata - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Abstract Information theoretic cryptography is discussed based on conditional Rényi
entropies. Our discussion focuses not only on cryptography but also on the definitions of …
entropies. Our discussion focuses not only on cryptography but also on the definitions of …
R\'enyi divergence-based uniformity guarantees for -universal hash functions
M Pathegama, A Barg - arXiv preprint arXiv:2410.16459, 2024 - arxiv.org
Universal hash functions map the output of a source to random strings over a finite alphabet,
aiming to approximate the uniform distribution on the set of strings. A classic result on these …
aiming to approximate the uniform distribution on the set of strings. A classic result on these …
Secret sharing schemes based on min-entropies
M Iwamoto, J Shikata - 2014 IEEE International Symposium on …, 2014 - ieeexplore.ieee.org
Fundamental results on secret sharing schemes (SSSs) are discussed in the setting where
security and share size are measured by (conditional) min-entropies. We first formalize a …
security and share size are measured by (conditional) min-entropies. We first formalize a …
Comparing security notions of secret sharing schemes
S Dai, D Guo - Entropy, 2015 - mdpi.com
Different security notions of secret sharing schemes have been proposed by different
information measures. Entropies, such as Shannon entropy and min entropy, are frequently …
information measures. Entropies, such as Shannon entropy and min entropy, are frequently …
Bit-error-rate guarantee for quantum key distribution and its characteristics compared to leftover hash lemma
T Iwakoshi - Quantum Information Science and Technology IV, 2018 - spiedigitallibrary.org
The trace distance criterion for security of Quantum Key Distribution (QKD) has been widely
perceived that its upperbound is the maximum failure probability in distributing an ideal …
perceived that its upperbound is the maximum failure probability in distributing an ideal …
Security of weak secrets based cryptographic primitives via the Renyi entropy
In ideality, cryptographic primitives take for granted that the secret sources are derived from
uniform distribution. However, in reality, we may only obtain some 'weak'random sources …
uniform distribution. However, in reality, we may only obtain some 'weak'random sources …