Perfect secrecy
Redirect to:
Information-theoretic security