메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1432-1436

Efficient protocols achieving the commitment capacity of noisy correlations

Author keywords

[No Author keywords available]

Indexed keywords

BIT COMMITMENT; COMMITMENT CAPACITY; NOISY CHANNELS; NOISY CORRELATIONS;

EID: 39049122173     PISSN: 21578101     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2006.262083     Document Type: Conference Paper
Times cited : (29)

References (18)
  • 1
    • 1142301536 scopus 로고    scopus 로고
    • Continuity of Quantum Conditional Information
    • R. Alicki and M. Fannes, "Continuity of Quantum Conditional Information," J. Phys. A: Math. Gen., vol. 37, no. 5, pp. L55-L57, 2004.
    • (2004) J. Phys. A: Math. Gen , vol.37 , Issue.5
    • Alicki, R.1    Fannes, M.2
  • 3
    • 0003030602 scopus 로고
    • Coin flipping by telephone: A protocol for solving impossible problems
    • M. Blum, "Coin flipping by telephone: a protocol for solving impossible problems," Proc. IEEE Computer Conference, pp. 133-137, 1982.
    • (1982) Proc. IEEE Computer Conference , pp. 133-137
    • Blum, M.1
  • 5
    • 84957356475 scopus 로고    scopus 로고
    • Efficient Cryptographic Protocols Based on Noisy Channels
    • Proc. EUROCRYPT '97, 1233, pp
    • C. Crépeau, "Efficient Cryptographic Protocols Based on Noisy Channels," Proc. EUROCRYPT '97. LNCS, vol. 1233, pp. 306-317, 1997.
    • (1997) LNCS , pp. 306-317
    • Crépeau, C.1
  • 6
    • 84864708144 scopus 로고
    • Multi-party Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
    • Proc. CRYPTO '87, 293, pp
    • D. Chaum, I. Damgård, and J. van de Graaf, "Multi-party Computations Ensuring Privacy of Each Party's Input and Correctness of the Result," Proc. CRYPTO '87. LNCS, vol. 293, pp. 87-119, 1988.
    • (1988) LNCS , pp. 87-119
    • Chaum, D.1    Damgård, I.2    van de Graaf, J.3
  • 7
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • C. Crépeau, J. Kilian, "Achieving oblivious transfer using weakened security assumptions," Proc. 29th FOCS, IEEE, pp. 42-52, 1988.
    • (1988) Proc. 29th FOCS, IEEE , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 9
    • 84957697395 scopus 로고    scopus 로고
    • On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
    • Proc. EUROCRYPT '99
    • I. B. Damgård, J. Kilian, L. Salvail, "On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions", Proc. EUROCRYPT '99. LNCS, vol. 1592, pp. 56-73, 1999.
    • (1999) LNCS , vol.1592 , pp. 56-73
    • Damgård, I.B.1    Kilian, J.2    Salvail, L.3
  • 10
    • 0022914590 scopus 로고
    • Proofs that Yield Nothing but the Validity of the Assertion, and the Methodology of Cryptographic Protocol Design
    • O. Goldreich, S. Micali, A. Wigderson, "Proofs that Yield Nothing but the Validity of the Assertion, and the Methodology of Cryptographic Protocol Design," Proc. 27th IEEE FOCS. pp. 174-187, 1986.
    • (1986) Proc. 27th IEEE FOCS , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 11
    • 0023545076 scopus 로고
    • How to Play Any Mental Game, or: A completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, A. Wigderson, "How to Play Any Mental Game, or: A completeness theorem for protocols with honest majority," Proc. 19th ACM STOC. pp. 218-229, 1987.
    • (1987) Proc. 19th ACM STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 12
    • 0345253860 scopus 로고    scopus 로고
    • A Pseudorandom Generator from any one-way function
    • J. Håstad, R. Impagliazzo, L.A. Levin, M. Luby, "A Pseudorandom Generator from any one-way function," SIAM J. on Comp., vol. 28, no. 4., pp. 1364-1396, 1999.
    • (1999) SIAM J. on Comp , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 14
    • 84948960386 scopus 로고    scopus 로고
    • Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
    • Proc. EUROCRYPT '00
    • U. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," Proc. EUROCRYPT '00. LNCS, vol. 1807, pp. 351-368, 2000.
    • (2000) LNCS , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 15
    • 0001448484 scopus 로고
    • Bit commitment using pseudo-randomness
    • M. Naor, "Bit commitment using pseudo-randomness", J. Cryptology, vol. 2, no. 2, pp. 151-158, 1991.
    • (1991) J. Cryptology , vol.2 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 16
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • and
    • C. E. Shannon, "A mathematical theory of communication," Bell System Tech. J. vol. 27, pp. 379-423 and 623-656, 1948.
    • (1948) Bell System Tech. J , vol.27
    • Shannon, C.E.1
  • 17
    • 23944463739 scopus 로고    scopus 로고
    • Commitment Capacity of Discrete Memoryless Channels
    • Proc. 9th IMA International Conf. on Cryptography and Coding
    • A. Winter, A. C. A. Nascimento, H. Imai, "Commitment Capacity of Discrete Memoryless Channels", Proc. 9th IMA International Conf. on Cryptography and Coding, LNCS, vol. 2898, pp. 35-51, 2003.
    • (2003) LNCS , vol.2898 , pp. 35-51
    • Winter, A.1    Nascimento, A.C.A.2    Imai, H.3
  • 18
    • 19544368112 scopus 로고    scopus 로고
    • Zero-error information and applications in cryptography
    • S. Wolf, J. Wullschleger, "Zero-error information and applications in cryptography", Proc. IEEE ITW '04, 2004.
    • (2004) Proc. IEEE ITW '04
    • Wolf, S.1    Wullschleger, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.