메뉴 건너뛰기




Volumn 49, Issue 4, 2003, Pages 822-831

Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result

Author keywords

Authentication; Cryptography; Secret key agreement; Typical sequences; Unconditional security

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); PROBABILITY DISTRIBUTIONS; RANDOM PROCESSES; SECURITY OF DATA;

EID: 0037396695     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2003.809563     Document Type: Article
Times cited : (138)

References (22)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, pp. 210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 5
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. IT-24, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 8
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 9
    • 85013455236 scopus 로고
    • Codes for interactive authentication
    • Advances in Cryptology - Proceedings of Crypto'93. Berlin, Germany; Springer-Verlag
    • P. Gemmell and M. Naor, "Codes for interactive authentication," in Advances in Cryptology - Proceedings of Crypto'93 (Lecture Notes in Computer Science). Berlin, Germany; Springer-Verlag, 1994, vol. 773, pp. 355-367.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 355-367
    • Gemmell, P.1    Naor, M.2
  • 10
    • 0141922749 scopus 로고    scopus 로고
    • Linking classical and quantum key agreement: Is there a classical analog to bound entanglement?
    • N. Gisin, R. Renner, and S. Wolf, "Linking classical and quantum key agreement: Is there a classical analog to bound entanglement?," Algorithmica, vol. 34, pp. 389-412, 2002.
    • (2002) Algorithmica , vol.34 , pp. 389-412
    • Gisin, N.1    Renner, R.2    Wolf, S.3
  • 11
    • 84974621399 scopus 로고    scopus 로고
    • Linking classical and quantum key agreement: Is there "bound information"?
    • Proceedings of CRYPTO 2000. Berlin, Germany: Springer-Verlag
    • N. Gisin and S. Wolf, "Linking classical and quantum key agreement: Is there "bound information"?," in Proceedings of CRYPTO 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1880, pp. 482-500.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 482-500
    • Gisin, N.1    Wolf, S.2
  • 12
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 13
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by NOT authenticated public discussion
    • Advances in Cryptology - EUROCRYPT'97. Berlin, Germany: Springer-Verlag
    • _. "Information-theoretically secure secret-key agreement by NOT authenticated public discussion," in Advances in Cryptology - EUROCRYPT'97 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1233, pp. 209-225.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 209-225
  • 14
    • 84955584118 scopus 로고    scopus 로고
    • Towards characterizing when information-theoretic secret key agreement is possible
    • Advances in Cryptology - ASIACRYPT'96. Berlin, Germany: Springer-Verlag
    • U. M. Maurer and S. Wolf, "Towards characterizing when information-theoretic secret key agreement is possible," in Advances in Cryptology - ASIACRYPT'96 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1996, vol. 1163, pp. 196-209.
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 196-209
    • Maurer, U.M.1    Wolf, S.2
  • 15
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar.
    • _, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 499-514
  • 16
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Advances in Cryptology - EUROCRYPT 2000. Berlin, Germany: Springer-Verlag
    • _, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology - EUROCRYPT 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1807, pp. 351-368.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 351-368
  • 17
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
    • Apr.
    • _, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 832-838
  • 18
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
    • Apr.
    • _, "Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 839-851
  • 19
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 20
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Advances in Cryptology - CRYPTO'91. Berlin, Germany: Springer-Verlag
    • D. R. Stinson, "Universal hashing and authentication codes," in Advances in Cryptology - CRYPTO'91 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1992, vol. 576, pp. 74-85.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 22
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.