메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 2142-2146

The secret key-private key capacity region for three terminals

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC INTERTERMINAL COMMUNICATION; SECRECY GENERATION;

EID: 33749438006     PISSN: 21578099     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2005.1523725     Document Type: Conference Paper
Times cited : (31)

References (15)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 4
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • March
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, March 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 5
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inform. Theory, vol. 50, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 7
    • 0005059185 scopus 로고
    • The strong secret key rate of discrete random triples
    • R.E. Blahut et al., Eds, Kluwer, Norwell, MA, Ch. 26
    • U. M. Maurer, "The strong secret key rate of discrete random triples," Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., Eds, Kluwer, Norwell, MA, Ch. 26, pp. 271-285, 1994.
    • (1994) Communications and Cryptography: Two Sides of One Tapestry , pp. 271-285
    • Maurer, U.M.1
  • 8
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • B. Kaliski, Ed., New York, NY: Springer
    • U. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science, B. Kaliski, Ed., New York, NY: Springer, 1997, pp. 307-321.
    • (1997) Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science , pp. 307-321
    • Maurer, U.1    Wolf, S.2
  • 9
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar.
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 10
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Lecture notes in Computer Science, Springer Verlag
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: from weak to strong secrecy for free," Proc. EUROCRYPT 2000, Lecture notes in Computer Science, pp. 352-368, Springer Verlag, 2000.
    • (2000) Proc. EUROCRYPT 2000 , pp. 352-368
    • Maurer, U.M.1    Wolf, S.2
  • 11
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
    • Apr.
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inform. Theory, vol. 49, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 12
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
    • Apr.
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 832-838
    • Maurer, U.1    Wolf, S.2
  • 13
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification
    • Apr.
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 14
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • E. Biham, Ed., Heidelberg, Germany: Springer-Verlag
    • R. Renner and S. Wolf, "New bounds in secret-key agreement: the gap between formation and secrecy extraction," Proc. EUROCRYPT'03, Lecture Notes in Computer Science, E. Biham, Ed., Heidelberg, Germany: Springer-Verlag, 2003, pp. 562-577.
    • (2003) Proc. EUROCRYPT'03, Lecture Notes in Computer Science , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 15
    • 5044250721 scopus 로고    scopus 로고
    • The private key capacity region for three terminals
    • Chicago, USA, June
    • C. Ye and P. Narayan, "The private key capacity region for three terminals," 2004 IEEE Intl. Symp. Inform. Theory, p. 44, Chicago, USA, June 2004.
    • (2004) 2004 IEEE Intl. Symp. Inform. Theory , pp. 44
    • Ye, C.1    Narayan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.