SEARCH Articles Figures Tables Information security Information-theoretic Security information-theoretic Signature Signature scheme