2022
DOI: 10.1007/978-3-031-15979-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…More accurately modeling Eve and analyzing Eve's attack capabilities is crucial. (3) Currently, computationally secure coding is not yet practical Ishai et al (2022Ishai et al ( , 2023. Therefore, our scheme utilizes information-theoretically secure coding to exploit entropy, which inherently incurs entropy loss.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…More accurately modeling Eve and analyzing Eve's attack capabilities is crucial. (3) Currently, computationally secure coding is not yet practical Ishai et al (2022Ishai et al ( , 2023. Therefore, our scheme utilizes information-theoretically secure coding to exploit entropy, which inherently incurs entropy loss.…”
Section: Discussionmentioning
confidence: 99%
“…As of the year 2022, existing wire-tap coding schemes are generally information-theoretically secure. In Ishai et al (2022) proposed a wire-tap coding scheme achieving computational security based on Ideal Obfuscation in the Oracle model. However, this scheme is merely a theoretical construction and lacks practical applicability.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation