메뉴 건너뛰기




Volumn , Issue , 2005, Pages 654-663

Correcting errors without leaking partial information

Author keywords

Bounded Storage Model; Code Obfuscation; Cryptography; Entropic Security; Error Correcting Codes; Information Reconciliation; Randomness Extractors

Indexed keywords

BOUNDED STORAGE MODEL; CODE OBFUSCATION; ENTROPIC SECURITY; ERROR-CORRECTING CODES; INFORMATION RECONCILIATION; RANDOMNESS EXTRACTORS;

EID: 34848837353     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1060590.1060688     Document Type: Conference Paper
Times cited : (124)

References (28)
  • 2
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. Bennett, G. Brassard, and J. Robert. Privacy Amplification by Public Discussion. SIAM J. on Computing, 17(2), pp. 210-229, 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.1    Brassard, G.2    Robert, J.3
  • 5
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • Christian Cachin, Ueli M. Maurer. Linking Information Reconciliation and Privacy Amplification. In J. Cryptology, 10(2), 97-110, 1997.
    • (1997) J. Cryptology , vol.10 , Issue.2 , pp. 97-110
    • Cachin, C.1    Maurer, U.M.2
  • 6
    • 0842305659 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information, In Advances in Cryptology - CRYPTO 1997.
    • Advances in Cryptology - CRYPTO 1997
    • Canetti, R.1
  • 12
    • 84890422142 scopus 로고    scopus 로고
    • Entropic security and the encryption of high-entropy messages
    • Y. Dodis and A. Smith. Entropic Security and the Encryption of High-Entropy Messages. In Theory of Cryptography 2005.
    • Theory of Cryptography 2005
    • Dodis, Y.1    Smith, A.2
  • 13
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • April
    • S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28(2), pp. 270-299, April 1984.
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 17
    • 0041426716 scopus 로고    scopus 로고
    • Practical protocol for advantage distillation and information reconciliation
    • Shengli Liu and Henk C. A. Van Tilborg and Marten Van Dijk. Practical Protocol for Advantage Distillation and Information Reconciliation. Des. Codes Cryptography, 30(1), 39-62, 2003.
    • (2003) Des. Codes Cryptography , vol.30 , Issue.1 , pp. 39-62
    • Liu, S.1    Henk, C.A.2    Van Tilborg, H.C.A.3    Van Dijk, M.4
  • 18
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from oil-line strong extractors
    • Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from Oil-Line Strong Extractors. J. Cryptology, 17(1): 27-42 (2004).
    • (2004) J. Cryptology , vol.17 , Issue.1 , pp. 27-42
    • Lu, C.-J.1
  • 21
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion
    • U. Maurer. Secret Key Agreement by Public Discussion. IEEE Trans. on Info. Theory, 39(3):733-742, 1993.
    • (1993) IEEE Trans. on Info. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 22
    • 0027641832 scopus 로고
    • Small-bias probability spaces: Efficient constructions and applications
    • J. Naor, M. Naor. Small-Bias Probability Spaces: Efficient Constructions and Applications.SIAM J. Comput. 22(4): 838-856 (1993).
    • (1993) SIAM J. Comput. , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 23
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan, D. Zuckerman. Randomness is Linear in Space. In JCSS, 52(1), pp. 43-52, 1996.
    • (1996) JCSS , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 25
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • R. Shaltiel. Recent developments in Explicit Constructions of Extractors. Bulletin of the EATCS, 77, pp. 67-95, 2002.
    • (2002) Bulletin of the EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 27
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • Salil P. Vadhan. Constructing Locally Computable Extractors and Cryptosystems In the Bounded-Storage Model. J. Cryptology 17(1): 43-77 (2004).
    • (2004) J. Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.