메뉴 건너뛰기




Volumn E89-A, Issue 10, 2006, Pages 2589-2596

Secret key capacity and advantage distillation capacity

Author keywords

Advantage distillation; Advantage distillation capacity; Outputs from independent erasure channels; Secret key agreement; Secret key capacity

Indexed keywords

CODES (SYMBOLS); COMPUTER SCIENCE; INFORMATION ANALYSIS; INFORMATION TECHNOLOGY;

EID: 33750078128     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e89-a.10.2589     Document Type: Conference Paper
Times cited : (10)

References (9)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol.39, no.4, pp.1121-1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 3
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional security against memory-bounded adversaries
    • C. Chachin and U. Maurer, "Unconditional security against memory-bounded adversaries," LNCS, vol.1294, pp.292-306, 1997.
    • (1997) LNCS , vol.1294 , pp. 292-306
    • Chachin, C.1    Maurer, U.2
  • 4
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár, "Almost independence and secrecy capacity," Prob. Inf. Transm., vol.32, no.1, pp.40-47, 1996.
    • (1996) Prob. Inf. Transm. , vol.32 , Issue.1 , pp. 40-47
    • Csiszár, I.1
  • 5
    • 10644270917 scopus 로고    scopus 로고
    • Secret key capacity for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan "Secret key capacity for multiple terminals," IEEE Trans. Inf. Theory, vol.50, no.12, pp.3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U.M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol.39, no.3, pp.733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 7
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • March
    • U.M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol.45, no.2, pp.499-514, March 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 8
    • 33747886952 scopus 로고    scopus 로고
    • Secret key agreement from correlated source outputs using low density parity check matrices
    • July
    • J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices," IEICE Trans. Fundamentals, vol.E89-A, no.7, pp.2036-2046, July 2006.
    • (2006) IEICE Trans. Fundamentals , vol.E89-A , Issue.7 , pp. 2036-2046
    • Muramatsu, J.1
  • 9
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," LNCS, vol.2656, pp.562-577, 2003.
    • (2003) LNCS , vol.2656 , pp. 562-577
    • Renner, R.1    Wolf, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.