entropy-logo

Journal Browser

Journal Browser

Information-Theoretic Cryptography and Security

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: 20 October 2024 | Viewed by 400

Special Issue Editor


E-Mail Website
Guest Editor
School of Information Science & Engineering, Southeast University, Nanjing 210096, China
Interests: physical layer security; communication security; multimedia security

Special Issue Information

Dear Colleagues,

Claude Shannon proposed the concept of perfect secrecy in his work in 1949. With the development of quantum computing technology, traditional mathematical complexity-based cryptographic key distribution methods face challenges. Emerging technologies such as quantum key distribution and physical layer key distribution provide conditions for realizing Shannon's concept of perfect secrecy. How to achieve the security of information-theoretic cryptography will be a problem of significant significance and challenge. This Special Issue aims to bring together recent research efforts that apply information theory to characterize and study the fundamental limits of cryptography and security. Possible topics include, but are not limited to, the following:

  • Post-quantum cryptography including lattice-based cryptography, multivariate cryptography, hash-based cryptography, code-based cryptography, isogeny-based cryptography, and symmetric key quantum resistance, among others.
  • Secure computation including secret sharing, secure multi-party computation, information-theoretic proof systems, randomness extraction and privacy amplification, differential privacy, and zero-knowledge proof, among others.
  • Quantum technology including quantum information processing, quantum key distribution, and secret key agreement in quantum technology, among others.
  • Physical layer security including secret key generation, physical layer authentication, secure communication, covert and stealthy communication, and secrecy capacity of communications channels, among others.

Dr. Linning Peng
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • post-quantum cryptography
  • secure computation
  • secure communication
  • quantum key distribution
  • physical layer security
  • secret key generation
  • secrecy capacity

Published Papers

This special issue is now open for submission.
Back to TopTop