entropy-logo

Journal Browser

Journal Browser

Information-Theoretic Cryptography and Steganography

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: closed (15 March 2024) | Viewed by 1594

Special Issue Editor


E-Mail Website
Guest Editor
1. Federal Research Center for Information and Computational Technologies, 630090 Novosibirsk, Russia
2. Department of Information Technologies, Novosibirsk State University, 630090 Novosibirsk, Russia
Interests: information theory; cryptography and steganography; mathematical statistics and prediction; complexity of algorithms and mathematical biology
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In the mid-twentieth century, Claude Shannon published two papers, "Mathematical Theory of Communication" and "Communication Theory of Secret Systems", which gave rise to information theory and modern cryptography respectively. In the following years, numerous results were obtained at the intersection of both fields, as well as computer science, and a new scientific field emerged, which is now called information-theoretic cryptography.

The main goal of information-theoretic cryptography is to achieve security in the presence of computationally unbounded adversaries. The so-called information-theoretic steganography has a similar goal: to achieve undetectable data hiding against a computationally unconstrained steganalyser.

Currently, hundreds of researchers are working in the field of information-theoretic cryptography and steganography, presenting their results in dozens of journals and conferences. But, despite numerous interesting results, many problems in the field of information-theoretic cryptography and steganography have not been solved, including those related to ciphers with secret keys, random number generators with proven properties, as well as various protocols for information security systems.

    This Special Issue will publish high-quality, original research papers dealing with topics such as:

  • Secure multi-party computation
  • Information-theoretic reductions
  • Information theoretic proof systems
  • Information theoretic steganography
  • Idealized models (e.g., ideal channels, random oracle)
  • Bounded storage models
  • Secret sharing
  • Authentication codes and non-malleable codes
  • Randomness extraction and privacy amplification
  • Private information retrieval and locally decodable code

This special issue is intended to be a forum for new presentations of results in the field of information-theoretic cryptography and steganography. In addition, new ideas for the development of information theory and computer science may be discovered.

Prof. Dr. Boris Ryabko
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • information theory
  • steganography
  • computationally unbounded adversary

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 1737 KiB  
Article
A Communication Anti-Jamming Scheme Assisted by RIS with Angular Response
by Jinpeng Wang, Wenyu Jiang, Kaizhi Huang and Xiaoli Sun
Entropy 2023, 25(12), 1638; https://doi.org/10.3390/e25121638 - 09 Dec 2023
Viewed by 700
Abstract
By optimizing the reconfigurable intelligent surface (RIS) reflection coefficients, the channel capacity of legitimate users can be increased, thereby enhancing the anti-jamming performance of communication systems. However, existing studies on RIS-assisted anti-jamming assume that there is no coupling between the RIS reflection coefficients [...] Read more.
By optimizing the reconfigurable intelligent surface (RIS) reflection coefficients, the channel capacity of legitimate users can be increased, thereby enhancing the anti-jamming performance of communication systems. However, existing studies on RIS-assisted anti-jamming assume that there is no coupling between the RIS reflection coefficients and the incident angle of electromagnetic (EM) waves, which is quite unreasonable. Therefore, we consider the effect of the incident angle of EM waves on the reflection coefficients of the RIS and propose a communication anti-jamming scheme assisted by an RIS with angular response. Specifically, a problem is formulated to optimize the RIS reflection coefficients so that the legitimate signal is amplified, but the jamming signal is attenuated, thus enhancing the legitimate channel capacity. However, the coupling of the EM incident angle and the RIS reflection coefficients causes the problem to be non-convex. To tackle this problem, we equivalently transform the RIS reflection coefficients optimization problem into a quadratically constrained quadratic programming (QCQP) problem using the complex Taylor expansion and the multidimensional complex quadratic transform (MCQT) and solve it utilizing the alternating direction method of the multipliers (ADMM) algorithm. The simulation results reveal that, compared to other schemes supported by RIS without angular response, the proposed scheme is able to achieve a significant improvement in the anti-jamming performance. Full article
(This article belongs to the Special Issue Information-Theoretic Cryptography and Steganography)
Show Figures

Figure 1

7 pages, 253 KiB  
Article
Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics
by Boris Ryabko
Entropy 2023, 25(10), 1406; https://doi.org/10.3390/e25101406 - 30 Sep 2023
Viewed by 563
Abstract
We consider the problem of constructing an unconditionally secure cipher with a short key for the case where the probability distribution of encrypted messages is unknown. Note that unconditional security means that an adversary with no computational constraints can only obtain a negligible [...] Read more.
We consider the problem of constructing an unconditionally secure cipher with a short key for the case where the probability distribution of encrypted messages is unknown. Note that unconditional security means that an adversary with no computational constraints can only obtain a negligible amount of information (“leakage”) about an encrypted message (without knowing the key). Here, we consider the case of a priori (partially) unknown message source statistics. More specifically, the message source probability distribution belongs to a given family of distributions. We propose an unconditionally secure cipher for this case. As an example, one can consider constructing a single cipher for texts written in any of the languages of the European Union. That is, the message to be encrypted could be written in any of these languages. Full article
(This article belongs to the Special Issue Information-Theoretic Cryptography and Steganography)
Back to TopTop