Skip to main content

Showing 1–3 of 3 results for author: Ohta, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:1907.02944  [pdf

    cs.IT

    Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory

    Authors: A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, J. H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hasimoto, O. Ytrehus, Shigeaki Kuzuoaka, Mikihiko Nishiara, Han Mao Kiah , et al. (2 additional authors not shown)

    Abstract: This year, 2019 we celebrate 30 years of our friendship between Asian and European scientists at the AEW11 in Rotterdam, the Netherlands. Many of the 1989 participants are also present at the 2019 event. This year we have many participants from different parts of Asia and Europe. It shows the importance of this event. It is a good tradition to pay a tribute to a special lecturer in our community.… ▽ More

    Submitted 26 June, 2019; originally announced July 2019.

  2. arXiv:1410.1120  [pdf, ps, other

    cs.CR cs.IT

    Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography

    Authors: Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata

    Abstract: This paper revisits formalizations of information-theoretic security for symmetric-key encryption and key agreement protocols which are very fundamental primitives in cryptography. In general, we can formalize information-theoretic security in various ways: some of them can be formalized as stand-alone security by extending (or relaxing) Shannon's perfect secrecy or by other ways such as semantic… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: 25 pages. Submitted to IEEE Trans. Inf. Theory

  3. arXiv:1106.1731  [pdf, ps, other

    cs.CR

    Security Notions for Information Theoretically Secure Encryptions

    Authors: Mitsugu Iwamoto, Kazuo Ohta

    Abstract: This paper is concerned with several security notions for information theoretically secure encryptions defined by the variational (statistical) distance. To ensure the perfect secrecy (PS), the mutual information is often used to evaluate the statistical independence between a message and a cryptogram. On the other hand, in order to recognize the information theoretically secure encryptions and co… ▽ More

    Submitted 4 January, 2012; v1 submitted 9 June, 2011; originally announced June 2011.

    Comments: 6 pages, presented at ISIT 2011