메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 478-493

One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; COMPUTER SIMULATION; ERRORS; IMMUNIZATION; MATHEMATICAL MODELS; PARAMETER ESTIMATION; POLARIZATION; PROBABILISTIC LOGICS; SECURITY OF DATA;

EID: 33745169714     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (45)

References (20)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • Rudolph Ahlswede and Imre Csiszàr. Common randomness in information theory and cryptography - part I: Secret sharing. IEEE Transactions on Information Theory, 39(4):1121-1132, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszàr, I.2
  • 3
    • 33745144140 scopus 로고
    • Broadcast channels with confidential messages
    • Imre Csiszár and János Körner. Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 22(6):644-654, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.22 , Issue.6 , pp. 644-654
  • 5
    • 35048881610 scopus 로고    scopus 로고
    • Immunizing encryption schemes from decryption errors
    • Christian Cachin and Jan Camenisch, editors, EUROCRYPT 2004
    • Cynthia Dwork, Moni Naor, and Omer Reingold. Immunizing encryption schemes from decryption errors. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT 2004, volume 3027 of LNCS, pages 342-360, 2004.
    • (2004) LNCS , vol.3027 , pp. 342-360
    • Dwork, C.1    Naor, M.2    Reingold, O.3
  • 6
    • 0001173821 scopus 로고    scopus 로고
    • Concatenated codes and their multilevel generalizations
    • V. S. Pless and W. C. Huffman, editors, chapter 23, North-Holland, Elsevier
    • Ilya I. Dumer. Concatenated codes and their multilevel generalizations. In V. S. Pless and W. C. Huffman, editors, The Handbook of Coding Theory, volume 2, chapter 23, pages 1191-1988. North-Holland, Elsevier, 1998.
    • (1998) The Handbook of Coding Theory , vol.2 , pp. 1191-1988
    • Dumer, I.I.1
  • 7
    • 34848917325 scopus 로고    scopus 로고
    • Key agreement from weak bit agreement
    • Thomas Holenstein. Key agreement from weak bit agreement. In Proceedings of the 37th STOC, pages 664-673, 2005.
    • (2005) Proceedings of the 37th STOC , pp. 664-673
    • Holenstein, T.1
  • 9
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions (extended abstract)
    • Russell Impagliazzo, Leonid A. Levin, and Michael Luby. Pseudo-random generation from one-way functions (extended abstract). In Proceedings of the 21st STOC, pages 12-24, 1989.
    • (1989) Proceedings of the 21st STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.A.2    Luby, M.3
  • 10
    • 0029516814 scopus 로고
    • Hard-core distributions for somewhat hard problems
    • Russell Impagliazzo. Hard-core distributions for somewhat hard problems. In 36th FOCS, pages 538-545, 1995.
    • (1995) 36th FOCS , pp. 538-545
    • Impagliazzo, R.1
  • 11
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • Ueli Maurer. Secret key agreement by public discussion. IEEE Transaction on Information Theory, 39(3):733-742, 1993.
    • (1993) IEEE Transaction on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 12
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Ueli Maurer and Stefan Wolf. Unconditionally secure key agreement and the intrinsic conditional information. IEEE Transaction on Information Theory, 45(2):499-514, 1999.
    • (1999) IEEE Transaction on Information Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.1    Wolf, S.2
  • 13
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • Eli Biham, editor, EUROCRYPT 2003
    • Renato Renner and Stefan Wolf. New bounds in secret-key agreement: The gap between formation and secrecy extraction. In Eli Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 562-577, 2003.
    • (2003) LNCS , vol.2656 , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 16
    • 84890522850 scopus 로고
    • Shannon. Communication theory of secrecy systems
    • Claude E. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28:656-715, 1949.
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Claude, E.1
  • 17
    • 0031334292 scopus 로고    scopus 로고
    • A complete promise problem for statistical zero-knowledge
    • Amit Sahai and Salil Vadhan. A complete promise problem for statistical zero-knowledge. In The 38th FOCS, pages 448-457, 1997.
    • (1997) The 38th FOCS , pp. 448-457
    • Sahai, A.1    Vadhan, S.2
  • 18
    • 0006629701 scopus 로고    scopus 로고
    • Manipulating statistical difference
    • Panos Pardalos, Sanguthevar Rajasekaran, and José Rolim, editors
    • Amit Sahai and Salil Vadhan. Manipulating statistical difference. In Panos Pardalos, Sanguthevar Rajasekaran, and José Rolim, editors, DIMACS Series, volume 43, pages 251-270, 1999.
    • (1999) DIMACS Series , vol.43 , pp. 251-270
    • Sahai, A.1    Vadhan, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.