메뉴 건너뛰기




Volumn , Issue , 2004, Pages 1-6

Zero-error information and applications in cryptography

Author keywords

[No Author keywords available]

Indexed keywords

COIN TOSSING; COMPUTATIONAL SECURITY; RANDOM VARIABLES; ZERO ERROR INFORMATION;

EID: 19544368112     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (51)

References (19)
  • 2
    • 0003030602 scopus 로고
    • Coin flpping by telephone: A protocol for solving impossible problems
    • Manuel Blum. Coin flpping by telephone: A protocol for solving impossible problems. In Proceedings of the 24th IEEE Computer Conference, pages 133-137, 1982.
    • (1982) Proceedings of the 24th IEEE Computer Conference , pp. 133-137
    • Blum, M.1
  • 4
    • 33745173314 scopus 로고    scopus 로고
    • Oblivious transfer from any noisy channel
    • To appear, Springer-Verlag
    • Claude Crepeau, Kirill Morozov, and Stefan Wolf. Oblivious transfer from any noisy channel. To appear in Proceedings of SCN'04, Springer-Verlag, 2004.
    • (2004) Proceedings of SCN'04
    • Crepeau, C.1    Morozov, K.2    Wolf, S.3
  • 5
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • Advances in Cryptology: CRYPTO'99. Springer-Verlag
    • Ivan Damgård, Joe Kilian, and Louis Salvail. On the (im) possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Advances in Cryptology: CRYPTO'99, volume 1592 of Lecture Notes in Computer Science, pages 56-73. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 6
    • 35048830930 scopus 로고    scopus 로고
    • Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
    • Lecture Notes in Computer Science. Springer-Verlag
    • Matthias Fitzi, Stefan Wolf, and Jürg Wullschleger. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness. In Advances in Cryptology: CRYPTO'04, Lecture Notes in Computer Science. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology: CRYPTO'04
    • Fitzi, M.1    Wolf, S.2    Wullschleger, J.3
  • 13
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • Ueli Maurer. Secret key agreement by public discussion. IEEE Transaction on Information Theory, 39(3):733-742, 1993.
    • (1993) IEEE Transaction on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 14
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Harvard Aiken Computation Laboratory
    • Michael O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory, 1981.
    • (1981) Technical Report , vol.TR-81
    • Rabin, M.O.1
  • 16
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Claude E. Shannon. A mathematical theory of communication. Bell System Tech. Journal, 27:379-423, 623-656, 1948.
    • (1948) Bell System Tech. Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 17
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Claude E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4
    • Shannon, C.E.1
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.