메뉴 건너뛰기




Volumn 2898, Issue , 2003, Pages 35-51

Commitment capacity of discrete memoryless channels

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL CAPACITY;

EID: 23944463739     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40974-8_4     Document Type: Article
Times cited : (78)

References (28)
  • 1
    • 0027629488 scopus 로고
    • Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing
    • R. Ahlswede, I. Csiszár, "Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing", IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
    • 0036495139 scopus 로고    scopus 로고
    • Strong converse for identification via quantum channels
    • R. Ahlswede, A. Winter, "Strong converse for identification via quantum channels", IEEE Trans. Inf. Theory, vol. 48, no. 3, pp. 569-579, 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , Issue.3 , pp. 569-579
    • Ahlswede, R.1    Winter, A.2
  • 7
    • 0032184559 scopus 로고    scopus 로고
    • Quantum Information Theory
    • C. H. Bennett, P. W. Shor, "Quantum Information Theory", IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2724-2742, 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.6 , pp. 2724-2742
    • Bennett, C.H.1    Shor, P.W.2
  • 8
    • 0003030602 scopus 로고
    • Coin fipping by telephone: A protocol for solving impossible problems
    • M. Blum, "Coin fipping by telephone: a protocol for solving impossible problems", Proc. IEEE Computer Conference, pp. 133-137, 1982.
    • (1982) Proc. IEEE Computer Conference , pp. 133-137
    • Blum, M.1
  • 10
    • 0026190385 scopus 로고
    • Constant-round perfect zero-knowledge computationally convincing protocols
    • G. Brassard, C. Crepeau, M. Yung, "Constant-round perfect zero-knowledge computationally convincing protocols", Theoretical Computer Science, vol. 84, pp. 23-52, 1991.
    • (1991) Theoretical Computer Science , vol.84 , pp. 23-52
    • Brassard, G.1    Crepeau, C.2    Yung, M.3
  • 12
    • 0000182415 scopus 로고
    • A measure of asymptotic eciency for tests of a hypothesis based on the sum of observations
    • H. Chernoff, "A measure of asymptotic eciency for tests of a hypothesis based on the sum of observations", Ann. Math. Statistics, vol. 23, pp. 493-507, 1952.
    • (1952) Ann. Math. Statistics , vol.23 , pp. 493-507
    • Chernoff, H.1
  • 13
    • 0010074899 scopus 로고    scopus 로고
    • Efficient Cryptographic Protocols Based on Noisy Channels
    • Springer
    • C. Crépeau, "Efficient Cryptographic Protocols Based on Noisy Channels", Advances in Cryptology: Proc. EUROCRYPT 1997 , pp. 306-317, Springer 1997.
    • (1997) Advances in Cryptology: Proc. EUROCRYPT 1997 , pp. 306-317
    • Crépeau, C.1
  • 14
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • IEEE
    • th FOCS, pp. 42-52. IEEE, 1988.
    • (1988) th FOCS , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 16
    • 84957697395 scopus 로고    scopus 로고
    • On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
    • Springer
    • I. B. Damgård, J. Kilian, L. Salvail, "On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions", Advances in Cryptology: EUROCRYPT 1999, pp. 56-73, Springer 1999.
    • (1999) Advances in Cryptology: EUROCRYPT 1999 , pp. 56-73
    • Damgård, I.B.1    Kilian, J.2    Salvail, L.3
  • 17
    • 84957608670 scopus 로고
    • Efficient commitment schemes with bounded sender and unbounded receiver
    • Proc. CRYPTO 1995, Springer Verlag
    • S. Halevi, "Efficient commitment schemes with bounded sender and unbounded receiver", Proc. CRYPTO 1995, pp. 84-96. LNCS 963, Springer Verlag, 1995.
    • (1995) LNCS , vol.963 , pp. 84-96
    • Halevi, S.1
  • 18
    • 0037519332 scopus 로고    scopus 로고
    • Practical and Provably-Secure Commitment Schemes from Collision Free Hashing
    • Advances in Cryptology: CRYPTO 1996, pp. 201-215, Springer Verlag
    • S. Halevi, S. Micali, "Practical and Provably-Secure Commitment Schemes from Collision Free Hashing", Advances in Cryptology: CRYPTO 1996, pp. 201-215, LNCS 1109, Springer Verlag, 1996.
    • (1996) LNCS , vol.1109
    • Halevi, S.1    Micali, S.2
  • 19
    • 0002863426 scopus 로고
    • Bounds for the quantity of information transmitted by a quantum channel
    • A. S. Holevo, "Bounds for the quantity of information transmitted by a quantum channel", Probl. Inf. Transm., vol. 9, no. 3, pp. 177-183, 1973.
    • (1973) Probl. Inf. Transm. , vol.9 , Issue.3 , pp. 177-183
    • Holevo, A.S.1
  • 20
    • 78149248764 scopus 로고
    • Protocols for Secret Key Agreement by Public Discussion Based on Common Information
    • U. Maurer, "Protocols for Secret Key Agreement by Public Discussion Based on Common Information", Advances in Cryptology: CRYPTO 1992, pp. 461-470,
    • (1992) Advances in Cryptology: CRYPTO , pp. 461-470
    • Maurer, U.1
  • 21
    • 0027599802 scopus 로고
    • Secret Key Agreement by Public Discussion
    • Springer 1993
    • Springer 1993. "Secret Key Agreement by Public Discussion", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
  • 22
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • D. Mayers, "Unconditionally secure quantum bit commitment is impossible", Phys. Rev. Letters, vol. 78, no. 17, pp. 3414-3417, 1997.
    • (1997) Phys. Rev. Letters , vol.78 , Issue.17 , pp. 3414-3417
    • Mayers, D.1
  • 23
    • 0001448484 scopus 로고
    • Bit commitment using pseudo-randomness
    • M. Naor, "Bit commitment using pseudo-randomness", J. Cryptology, vol. 2, no. 2, pp. 151-158, 1991.
    • (1991) J. Cryptology , vol.2 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 25
    • 85028762469 scopus 로고
    • Secure commitments against a powerful adversary
    • Proc. STAGS 1992, Springer Verlag
    • R. Ostrovsky, R. Venkatesan, M. Yung, "Secure commitments against a powerful adversary", Proc. STAGS 1992, pp. 439-448, LNCS 577, Springer Verlag, 1992.
    • (1992) LNCS , vol.577 , pp. 439-448
    • Ostrovsky, R.1    Venkatesan, R.2    Yung, M.3
  • 27
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, "A mathematical theory of communication", Bell System Tech. Journal, vol. 27, pp. 379-423 and 623-656, 1948.
    • (1948) Bell System Tech. Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 28
    • 0016562514 scopus 로고
    • The Wire Tap Channel
    • A. Wyner, "The Wire Tap Channel", Bell System Tech. Journal, vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell System Tech. Journal , vol.54 , pp. 1355-1387
    • Wyner, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.