메뉴 건너뛰기




Volumn 49, Issue 4, 2003, Pages 839-851

Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification

Author keywords

Authentication; Cryptography; Privacy amplification; Quantum key agreement; Secret key agreement; Unconditional security

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); NETWORK PROTOCOLS; PROBABILITY DISTRIBUTIONS; SECURITY OF DATA;

EID: 0037396951     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2003.809559     Document Type: Article
Times cited : (137)

References (24)
  • 2
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Computing, vol. 17, pp. 210-229, 1988.
    • (1988) SIAM J. Computing , vol.17 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 4
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • C. Cachin and U. M. Maurer, "Linking information reconciliation and privacy amplification," in J. Cryptol., vol. 10, 1997, pp. 97-110.
    • (1997) J. Cryptol. , vol.10 , pp. 97-110
    • Cachin, C.1    Maurer, U.M.2
  • 5
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. IT-24, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 8
    • 85013455236 scopus 로고
    • Codes for interactive authentication
    • Advances in Cryptology - CRYPTO'93. Berlin, Germany: Springer-Verlag
    • P. Gemmell and M. Naor, "Codes for interactive authentication," in Advances in Cryptology - CRYPTO '93 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1994, vol. 773, pp. 355-367.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 355-367
    • Gemmell, P.1    Naor, M.2
  • 9
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 10
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by NOT authenticated public discussion
    • Advances in Cryptology - EURO-CRYPT'97. Berlin, Germany: Springer-Verlag
    • _, "Information-theoretically secure secret-key agreement by NOT authenticated public discussion," in Advances in Cryptology - EURO-CRYPT '97 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1233, pp. 209-225.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 209-225
  • 11
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • July
    • _, "Authentication theory and hypothesis testing," IEEE Trans. Inform. Theory, vol. 46, pp. 1350-1356, July 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 1350-1356
  • 12
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • Advances in Cryptology - CRYPTO '97. Berlin, Germany: Springer-Verlag
    • U. M. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology - CRYPTO '97 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1294, pp. 307-321.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 307-321
    • Maurer, U.M.1    Wolf, S.2
  • 13
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar.
    • _, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 499-514
  • 14
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Advances in Cryptology - EUROCRYPT 2000. Berlin, Germany: Springer-Verlag
    • _, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology - EUROCRYPT 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1807, pp. 351-368.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 351-368
  • 15
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
    • Apr.
    • _, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inform. Theory, vol. 49, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 822-831
  • 16
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
    • Apr.
    • _, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 832-838
  • 17
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comput. Syst. Sci., vol. 52, no. 1, pp. 43-52, 1996.
    • (1996) J. Comput. Syst. Sci. , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 18
    • 0032629108 scopus 로고    scopus 로고
    • Extracting all the randomness and reducing the error in Trevisan's extractors
    • R. Raz, O. Reingold, and S. Vadhan, "Extracting all the randomness and reducing the error in Trevisan's extractors," in Proc. Symp. Theory of Computing (STOC'99), 1999, pp. 149-158.
    • (1999) Proc. Symp. Theory of Computing (STOC'99) , pp. 149-158
    • Raz, R.1    Reingold, O.2    Vadhan, S.3
  • 19
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 20
    • 0024015453 scopus 로고
    • A survey of information authentication
    • May
    • G. J. Simmons, "A survey of information authentication," Proc. IEEE, vol. 76, pp. 603-620, May 1988.
    • (1988) Proc. IEEE , vol.76 , pp. 603-620
    • Simmons, G.J.1
  • 21
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Advances in Cryptology - CRYPTO '91. Berlin, Germany. Springer-Verlag
    • D. R. Stinson, "Universal hashing and authentication codes," in Advances in Cryptology - CRYPTO '91 (Lecture Notes in Computer Science). Berlin, Germany. Springer-Verlag, 1992, vol. 576, pp. 74-85.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 22
    • 84947780088 scopus 로고    scopus 로고
    • Strong security against active attacks in information-theoretic secret-key agreement
    • Advances in Cryptology - ASIACRYPT '98. Berlin, Germany: Springer-Verlag
    • S. Wolf, "Strong security against active attacks in information-theoretic secret-key agreement," in Advances in Cryptology - ASIACRYPT '98 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1998, vol. 1514, pp. 405-419.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 405-419
    • Wolf, S.1
  • 24
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.