메뉴 건너뛰기




Volumn 50, Issue 12, 2004, Pages 3047-3061

Secrecy capacities for multiple terminals

Author keywords

Common randomness; Multiple source; Private key; Public discussion; Secrecy capacity; Security index; Slepian Wolf constraints; Wiretap

Indexed keywords

CONSTRAINT THEORY; CRYPTOGRAPHY; DATA PRIVACY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 10644270917     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2004.838380     Document Type: Article
Times cited : (390)

References (14)
  • 1
    • 0027629488 scopus 로고
    • "Common randomness in information theory and cryptography, part I: Secret sharing"
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
    • 0031701886 scopus 로고    scopus 로고
    • "Common randomness in information theory and cryptography, part II: CR capacity"
    • Jan
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, part II: CR capacity," IEEE Trans. Inform. Theory vol. 44, pp. 225-240, Jan. 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.44 , pp. 225-240
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 0016486048 scopus 로고
    • "A proof of the data compression theorem of Slepian and Wolf for ergodic sources"
    • Mar
    • T. M. Cover, "A proof of the data compression theorem of Slepian and Wolf for ergodic sources," IEEE Trans. Inform. Theory, vol. IT-21, pp. 226-228, Mar. 1975.
    • (1975) IEEE Trans. Inform. Theory , vol.IT-21 , pp. 226-228
    • Cover, T.M.1
  • 5
    • 0029706655 scopus 로고    scopus 로고
    • "Almost independence and secrecy capacity"
    • I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
    • (1996) Probl. Pered. Inform. , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1
  • 6
    • 0033891095 scopus 로고    scopus 로고
    • "Common randomness and secret key generation with a helper"
    • Mar
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 8
    • 0027599802 scopus 로고
    • "Secret key agreement by public discussion from common information"
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 9
    • 0005059185 scopus 로고
    • "The strong secret key rate of discrete random triples"
    • R. E. Blahut et al., Eds. Norwell, MA: Kluwer, ch. 26
    • U. M. Maurer, "The strong secret key rate of discrete random triples," in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut et al., Eds. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
    • (1994) Communications and Cryptography: Two Sides of One Tapestry , pp. 271-285
    • Maurer, U.M.1
  • 10
    • 84958670019 scopus 로고    scopus 로고
    • "Privacy amplification secure against active adversaries"
    • B. Kaliski, Ed. New York: Springer-Verlag
    • U. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology-CRYPTO'97 (Lecture Notes in Computer Science), B. Kaliski, Ed. New York: Springer-Verlag, 1997, pp. 307-321.
    • (1997) Advances in Cryptology-CRYPTO'97 (Lecture Notes in Computer Science) , pp. 307-321
    • Maurer, U.1    Wolf, S.2
  • 11
    • 84948960386 scopus 로고    scopus 로고
    • "Information-theoretic key agreement: From weak to strong secrecy for free"
    • Berlin, Germany: Springer-Verlag
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000 (Lecture notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, pp. 352-368.
    • (2000) Proc. EUROCRYPT 2000 (Lecture Notes in Computer Science) , pp. 352-368
    • Maurer, U.M.1    Wolf, S.2
  • 12
    • 35248888499 scopus 로고    scopus 로고
    • "New bounds in secret-key agreement: The gap between formation and secrecy extraction"
    • Berlin, Germany: Springer-Verlag
    • R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT 2003 (Lecture notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003.
    • (2003) Proc. EUROCRYPT 2003 (Lecture Notes in Computer Science)
    • Renner, R.1    Wolf, S.2
  • 14
    • 0036611983 scopus 로고    scopus 로고
    • "Communicating via a processing broadcast satellite"
    • June
    • A. D. Wyner, J. K. Wolf, and F. M. J. Willems, "Communicating via a processing broadcast satellite," IEEE Trans. Inform. Theory, vol. 48, pp. 1243-1249, June 2002.
    • (2002) IEEE Trans. Inform. Theory , vol.48 , pp. 1243-1249
    • Wyner, A.D.1    Wolf, J.K.2    Willems, F.M.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.