entropy-logo

Journal Browser

Journal Browser

Information-Theoretic Cryptography and Security

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: 20 October 2024 | Viewed by 520

Special Issue Editor


E-Mail Website
Guest Editor
School of Information Science & Engineering, Southeast University, Nanjing 210096, China
Interests: physical layer security; communication security; multimedia security

Special Issue Information

Dear Colleagues,

Claude Shannon proposed the concept of perfect secrecy in his work in 1949. With the development of quantum computing technology, traditional mathematical complexity-based cryptographic key distribution methods face challenges. Emerging technologies such as quantum key distribution and physical layer key distribution provide conditions for realizing Shannon's concept of perfect secrecy. How to achieve the security of information-theoretic cryptography will be a problem of significant significance and challenge. This Special Issue aims to bring together recent research efforts that apply information theory to characterize and study the fundamental limits of cryptography and security. Possible topics include, but are not limited to, the following:

  • Post-quantum cryptography including lattice-based cryptography, multivariate cryptography, hash-based cryptography, code-based cryptography, isogeny-based cryptography, and symmetric key quantum resistance, among others.
  • Secure computation including secret sharing, secure multi-party computation, information-theoretic proof systems, randomness extraction and privacy amplification, differential privacy, and zero-knowledge proof, among others.
  • Quantum technology including quantum information processing, quantum key distribution, and secret key agreement in quantum technology, among others.
  • Physical layer security including secret key generation, physical layer authentication, secure communication, covert and stealthy communication, and secrecy capacity of communications channels, among others.

Dr. Linning Peng
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • post-quantum cryptography
  • secure computation
  • secure communication
  • quantum key distribution
  • physical layer security
  • secret key generation
  • secrecy capacity

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 579 KiB  
Article
Minimizing Computation and Communication Costs of Two-Sided Secure Distributed Matrix Multiplication under Arbitrary Collusion Pattern
by Jin Li, Nan Liu and Wei Kang
Entropy 2024, 26(5), 407; https://doi.org/10.3390/e26050407 (registering DOI) - 08 May 2024
Abstract
This paper studies the problem of minimizing the total cost, including computation cost and communication cost, in the system of two-sided secure distributed matrix multiplication (SDMM) under an arbitrary collusion pattern. In order to perform SDMM, the two input matrices are split into [...] Read more.
This paper studies the problem of minimizing the total cost, including computation cost and communication cost, in the system of two-sided secure distributed matrix multiplication (SDMM) under an arbitrary collusion pattern. In order to perform SDMM, the two input matrices are split into some blocks, blocks of random matrices are appended to protect the security of the two input matrices, and encoded copies of the blocks are distributed to all computing nodes for matrix multiplication calculation. Our aim is to minimize the total cost, overall matrix splitting factors, number of appended random matrices, and distribution vector, while satisfying the security constraint of the two input matrices, the decodability constraint of the desired result of the multiplication, the storage capacity of the computing nodes, and the delay constraint. First, a strategy of appending zeros to the input matrices is proposed to overcome the divisibility problem of matrix splitting. Next, the optimization problem is divided into two subproblems with the aid of alternating optimization (AO), where a feasible solution can be obtained. In addition, some necessary conditions for the problem to be feasible are provided. Simulation results demonstrate the superiority of our proposed scheme compared to the scheme without appending zeros and the scheme with no alternating optimization. Full article
(This article belongs to the Special Issue Information-Theoretic Cryptography and Security)
Show Figures

Figure 1

Back to TopTop