메뉴 건너뛰기




Volumn 41, Issue 6, 1995, Pages 1915-1923

Generalized Privacy Amplification

Author keywords

Cryptography; privacy amplification; quantum cryptography; R nyi entropy; secrecy capacity; secret key agreement; unconditional security; universal hashing; wiretap channel

Indexed keywords

CHANNEL CAPACITY; COMMUNICATION CHANNELS (INFORMATION THEORY); INFORMATION RETRIEVAL; RANDOM PROCESSES; SECURITY OF DATA;

EID: 0029405656     PISSN: 00189448     EISSN: 15579654     Source Type: Journal    
DOI: 10.1109/18.476316     Document Type: Article
Times cited : (1206)

References (33)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography—Part I: Secret sharing
    • R. Ahlswede and I. Csiszár, “Common randomness in information theory and cryptography—Part I: Secret sharing,” IEEE Trans. Inform. Theory, vol. it-39, pp. 1121–1132, 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.it-39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 4
    • 11944263767 scopus 로고
    • Quantum cryptography without Bell's theorem
    • C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell's theorem,” Phys. Rev. Lett., vol. 68, pp. 557–559, 1992.
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 557-559
    • Bennett, C.H.1    Brassard, G.2    Mermin, N.D.3
  • 5
    • 84950117252 scopus 로고
    • How to reduce your enemy's information
    • (Lecture Notes in Computer Science) Berlin, Germany: Springer-Verlag
    • C. H. Bennett, G. Brassard, and J.-M. Robert, “How to reduce your enemy's information,” in Advances in Cryptology — Proceedings of Crypto'85 (Lecture Notes in Computer Science, vol. 218). Berlin, Germany: Springer-Verlag, 1986, pp. 468–476.
    • (1986) Advances in Cryptology — Proceedings of Crypto'85 , vol.218 , pp. 468-476
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 6
  • 7
    • 84938011473 scopus 로고
    • Orthogonal arrays, resilient functions, error correcting codes and linear programming bounds
    • to appear
    • J. Bierbrauer, K. Gopalakrishnan, and D. R. Stinson, “Orthogonal arrays, resilient functions, error correcting codes and linear programming bounds,” to appear in SIAM J. Discr. Math., 1994.
    • (1994) SIAM J. Discr. Math.
    • Bierbrauer, J.1    Gopalakrishnan, K.2    Stinson, D.R.3
  • 9
    • 6544287071 scopus 로고
    • Cryptology column—Quantum cryptography: A bibliography
    • G. Brassard, “Cryptology column—Quantum cryptography: A bibliography,” Sigact News, vol. 24, no. 3, pp. 16–20, 1993.
    • (1993) Sigact News , vol.24 , Issue.3 , pp. 16-20
    • Brassard, G.1
  • 11
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • (Lecture Notes in Computer Science). Germany: Springer Verlag Berlin
    • G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion,” in Advances in Cryptology-Proc. Eurocrypt'93 (Lecture Notes in Computer Science, vol. 765). Germany: Springer Verlag, Berlin, 1994, pp. 410–423.
    • (1994) Advances in Cryptology-Proc. Eurocrypt'93 , vol.765 , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 12
    • 84938008556 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • to appear
    • C. Cachin and U. M. Maurer, “Linking information reconciliation and privacy amplification,” J. Cryptol., to appear.
    • J. Cryptol.
    • Cachin, C.1    Maurer, U.M.2
  • 13
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L. Carter and M. N. Wegman, “Universal classes of hash functions,” J. Comput. Syst. Sci., vol. 18, pp. 143–154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 16
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • —, “Broadcast channels with confidential messages,” IEEE Trans. Inform. Theory, vol. IT-24, no. 3, pp. 339–348, 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 17
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Inform. Theory, vol. IT-22, pp. 644–654, 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 21
    • 84947268418 scopus 로고
    • Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept
    • (Lecture Notes in Computer Science). Germany: Springer-Verlag, Berlin
    • V. Korzhik and V. Yakovlev, “Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept,” in Advances in Cryptology-Proceedings of Auscrypt'92 (Lecture Notes in Computer Science, vol. 718). Germany: Springer-Verlag, Berlin, 1993, pp. 185–195.
    • (1993) Advances in Cryptology-Proceedings of Auscrypt'92 , vol.718 , pp. 185-195
    • Korzhik, V.1    Yakovlev, V.2
  • 23
    • 0029357908 scopus 로고
    • Quantum key distribution over distances up to 30 km
    • May 15
    • C. Marand and P. D. Townsend, “Quantum key distribution over distances up to 30 km,” Opt. Lett., vol. 20, May 15, 1995.
    • (1995) Opt. Lett. , vol.20
    • Marand, C.1    Townsend, P.D.2
  • 24
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inform. Theory, vol. 39, pp. 733–742, 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 25
    • 0005059185 scopus 로고
    • The strong secret key rate of discrete random triples
    • R.E. Blahut et al. Eds. Norwell, MA: Kluwer
    • —, “The strong secret key rate of discrete random triples,” in Communications and Cryptography, Two Sides of one Tapestry, R.E. Blahut et al. Eds. Norwell, MA: Kluwer, 1994, pp. 271–285.
    • (1994) Communications and Cryptography, Two Sides of one Tapestry , pp. 271-285
    • Maurer, U.M.1
  • 26
    • 84956073647 scopus 로고
    • Experimental demonstration of quantum cryptography using polarized photons in optical fiber over more than 1 km
    • Aug.
    • A. Muller, J. Breguet, and N. Gisin, “Experimental demonstration of quantum cryptography using polarized photons in optical fiber over more than 1 km,” Europhys. Lett., vol. 23, no. 6.20 pp. 383–388, Aug. 1993.
    • (1993) Europhys. Lett. , vol.23 , Issue.6.20 , pp. 383-388
    • Muller, A.1    Breguet, J.2    Gisin, N.3
  • 28
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 29
    • 0029327136 scopus 로고    scopus 로고
    • An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions
    • to appear
    • D. R. Stinson and J. L. Massey, “An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions,” J. Cryptol., vol. 8, no. 3, to appear.
    • J. Cryptol. , vol.8 , Issue.3
    • Stinson, D.R.1    Massey, J.L.2
  • 30
    • 0028428439 scopus 로고
    • Secure key distribution system based on quantum cryptography
    • May 12
    • P. D. Townsend, “Secure key distribution system based on quantum cryptography,” Electron. Lett., vol. 30, no. 10, pp. 809–810, May 12, 1994.
    • (1994) Electron. Lett. , vol.30 , Issue.10 , pp. 809-810
    • Townsend, P.D.1
  • 31
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio telegraphic communications,” J. Amer. Inst. Elec. Eng., vol. 55, pp. 109–115, 1926.
    • (1926) J. Amer. Inst. Elec. Eng. , vol.55 , pp. 109-115
    • Vernam, G.S.1
  • 32
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter, “New hash functions and their use in authentication and set equality,” J. Comput. Syst. Sci., vol. 22, pp. 265–279, 1981.
    • (1981) J. Comput. Syst. Sci. , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 33
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, “The wire-tap channel,” Bell Syst. Techn. J., vol. 54, no. 8, pp. 1355–1387, 1975.
    • (1975) Bell Syst. Techn. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.