메뉴 건너뛰기




Volumn 54, Issue 6, 2008, Pages 2535-2549

Key distribution protocols based on noisy channels in presence of an active adversary: Conventional and new versions with parameter optimization

Author keywords

Authentication; Cryptography; Information theoretic security; Privacy amplification; Wiretap channels

Indexed keywords

AEROSPACE APPLICATIONS; ASYMPTOTIC ANALYSIS; COMPUTER NETWORKS; INFORMATION THEORY; NETWORK PROTOCOLS; OPTIMIZATION; SENSOR NETWORKS; STRUCTURAL OPTIMIZATION;

EID: 45249100625     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.921689     Document Type: Article
Times cited : (17)

References (33)
  • 1
    • 85115374351 scopus 로고
    • Algorithms for quantum computation: Discrete logarithms and factoring
    • NM, Nov., Cupertino, CA: IEEE Computer Society Press
    • P. W. Shot, "Algorithms for quantum computation: Discrete logarithms and factoring," in Proc. 35th Annu. Symp. Foundations of Computer Science (Santa Fe, NM, Nov. 1994). Cupertino, CA: IEEE Computer Society Press, 1994, pp. 124-134.
    • (1994) Proc. 35th Annu. Symp. Foundations of Computer Science (Santa Fe , pp. 124-134
    • Shot, P.W.1
  • 2
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 3
    • 0017495002 scopus 로고
    • An extension of the Shannon theory approach to crypotgraphy
    • Mar
    • M. E. Hellman, "An extension of the Shannon theory approach to crypotgraphy," IEEE Trans. Inf. Theory, vol. IT-23, no. 2, pp. 289-294, Mar. 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.IT-23 , Issue.2 , pp. 289-294
    • Hellman, M.E.1
  • 5
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 6
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 7
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels III: Privacy amplification
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels III: Privacy amplification," IEEE Trans. Inf. Theory vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 8
    • 0016562514 scopus 로고
    • Wire-tap channel concept
    • A. Wyner, "Wire-tap channel concept," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 9
    • 0017973511 scopus 로고
    • Broadcast channel with confidential messages
    • Mar
    • I. Csiszár and J. Körner, "Broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 2, pp. 339-348, Mar. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.2 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 10
    • 0019631740 scopus 로고
    • Non-asymptotic estimates for efficiency of code jammmg in a wiretap channel
    • V. Korjik and V. Yakovlev, "Non-asymptotic estimates for efficiency of code jammmg in a wiretap channel," Probl. Inf. Transm., vol. 17, pp. 223-22, 1981.
    • (1981) Probl. Inf. Transm , vol.17 , pp. 223-322
    • Korjik, V.1    Yakovlev, V.2
  • 11
    • 45249091440 scopus 로고
    • Capacity of communication channel with inner random coding
    • V. Korjik and V. Yakovlev, "Capacity of communication channel with inner random coding," Probl. Inf. Transm., vol. 28, pp. 317-325, 1992.
    • (1992) Probl. Inf. Transm , vol.28 , pp. 317-325
    • Korjik, V.1    Yakovlev, V.2
  • 13
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by not authenticated public discussion
    • Berlin, Germany: Springer-Verlag
    • U. Maurer, "Information-theoretically secure secret-key agreement by not authenticated public discussion," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1997, vol. 1233, pp. 209-223.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 209-223
    • Maurer, U.1
  • 14
    • 78149248764 scopus 로고    scopus 로고
    • U. Maurer, Protocols for secret key agreement by public discussion based on common information, in Proc. CRYPTO (Lecture Notes in Computer Science), E. F. Brickell, Ed. Berlin, Germany: Springer-Verlag, 1992, 740, pp. 461-470.
    • U. Maurer, "Protocols for secret key agreement by public discussion based on common information," in Proc. CRYPTO (Lecture Notes in Computer Science), E. F. Brickell, Ed. Berlin, Germany: Springer-Verlag, 1992, vol. 740, pp. 461-470.
  • 15
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • Berlin, Germany: Springer-Verlag
    • U. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1997, vol. 1294, pp. 307-321.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 307-321
    • Maurer, U.1    Wolf, S.2
  • 16
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 17
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels II: The simulatability condition
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.1    Wolf, S.2
  • 18
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar
    • U. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.1    Wolf, S.2
  • 19
    • 84955584118 scopus 로고    scopus 로고
    • U. Maurer and S. Wolf, Towards characterizing when information-theoretic secret key agreement is possible, in Proc. ASIACRYPT (Lecture Notes in Computer Science), K. Kim and T. Matsumoto, Eds. Berlin, Germany: Springer-Verlag, 1996, 1163, pp. 196-209.
    • U. Maurer and S. Wolf, "Towards characterizing when information-theoretic secret key agreement is possible," in Proc. ASIACRYPT (Lecture Notes in Computer Science), K. Kim and T. Matsumoto, Eds. Berlin, Germany: Springer-Verlag, 1996, vol. 1163, pp. 196-209.
  • 20
    • 35248865664 scopus 로고    scopus 로고
    • Achievability of the key-capacity in a scenario of key sharing by public discussion in the presence of passive eavesdropper
    • Proc. Workshop on MMM-ACNS , Berlin, Germany: Springer-Verlag
    • V. Korzhik, V. Yakovlev, and A. Sinuk, "Achievability of the key-capacity in a scenario of key sharing by public discussion in the presence of passive eavesdropper," in Proc. Workshop on MMM-ACNS (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003, vol. 2776, pp. 308-315.
    • (2003) Lecture Notes in Computer Science , vol.2776 , pp. 308-315
    • Korzhik, V.1    Yakovlev, V.2    Sinuk, A.3
  • 21
    • 35248843427 scopus 로고    scopus 로고
    • Key distribution based on noisy channel and error detecting codes
    • Proc. Workshop MMM-ACNS , Berlin, Germany: Springer-Verlag
    • V. Korzhik, V. Yakovlev, and A. Sinuk, "Key distribution based on noisy channel and error detecting codes," in Proc. Workshop MMM-ACNS (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2001, vol. 2052, pp. 242-250.
    • (2001) Lecture Notes in Computer Science , vol.2052 , pp. 242-250
    • Korzhik, V.1    Yakovlev, V.2    Sinuk, A.3
  • 22
    • 0028195832 scopus 로고
    • Estimating the mutual interference of two sources in multiple access channel
    • V. Yakovlev, "Estimating the mutual interference of two sources in multiple access channel," Probl. Inf. Transm., vol. 30, pp. 11-26, 1994.
    • (1994) Probl. Inf. Transm , vol.30 , pp. 11-26
    • Yakovlev, V.1
  • 23
    • 0038309373 scopus 로고    scopus 로고
    • Extracting all the randomness and reducing the error in trevisan's extractors
    • R. Raz, O. Reingold, and S. P. Vadhan, "Extracting all the randomness and reducing the error in trevisan's extractors," J. Comput. Syst. Sci., vol. 65, no. 1, pp. 97-128, 2002.
    • (2002) J. Comput. Syst. Sci , vol.65 , Issue.1 , pp. 97-128
    • Raz, R.1    Reingold, O.2    Vadhan, S.P.3
  • 24
    • 0032624550 scopus 로고    scopus 로고
    • Construction of extractors using pseudo-random generators (extended abstract)
    • Atlanta, GA, May
    • L. Trevisan, "Construction of extractors using pseudo-random generators (extended abstract)," in Proc. 31st Annu. ACM Symp. Theory of Computing (STOC), Atlanta, GA, May 1999, pp. 141-148.
    • (1999) Proc. 31st Annu. ACM Symp. Theory of Computing (STOC) , pp. 141-148
    • Trevisan, L.1
  • 25
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Nov
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
    • (2005) IEEE Trans. Antennas Propag , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 27
    • 45249117643 scopus 로고    scopus 로고
    • Performance Estimation of Secret Key Agreement System Exploiting an ESPAR Antenna and a Received Signal Strength Indicator, Institute of Electronics, Information and Communication Engineers, IEIC Tech
    • Rep. 682 RCS2003353-389
    • H. Mori, H. Sasaoka, and T. Ohira, Performance Estimation of Secret Key Agreement System Exploiting an ESPAR Antenna and a Received Signal Strength Indicator, Institute of Electronics, Information and Communication Engineers, IEIC Tech. Rep. 682 (RCS2003353-389), 2004, pp. 19-24.
    • (2004) , pp. 19-24
    • Mori, H.1    Sasaoka, H.2    Ohira, T.3
  • 28
    • 38549116073 scopus 로고    scopus 로고
    • On the possibility of key agreement using variable directional antenna
    • Seoul, Korea, Sep
    • H. Imai, K. Kobara, and K. Morozov, "On the possibility of key agreement using variable directional antenna," in Proc. 1st Joint Workshop on Information Security, Seoul, Korea, Sep. 2006, pp. 1432-1436.
    • (2006) Proc. 1st Joint Workshop on Information Security , pp. 1432-1436
    • Imai, H.1    Kobara, K.2    Morozov, K.3
  • 29
    • 35248884195 scopus 로고    scopus 로고
    • Privacy amplification theorem for noisy main channel
    • Berlin, Germany: Springer-Verlag
    • V. Korjik, G. Morales-Luna, and V. Balakirsky, "Privacy amplification theorem for noisy main channel," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2001, vol. 2200, pp. 18-26.
    • (2001) Lecture Notes in Computer Science , vol.2200 , pp. 18-26
    • Korjik, V.1    Morales-Luna, G.2    Balakirsky, V.3
  • 30
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Berlin, Germany: Springer-Verlag
    • D. Stinson, "Universal hashing and authentication codes," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1992, vol. 576, pp. 74-85.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 74-85
    • Stinson, D.1
  • 31
    • 45249109952 scopus 로고    scopus 로고
    • Hybrid authentication based on noisy channels
    • V. I. Korzhik and G. Morales-Luna, "Hybrid authentication based on noisy channels," Int. J. Inf. Sec., vol. 1, no. 4, pp. 203-210, 2003.
    • (2003) Int. J. Inf. Sec , vol.1 , Issue.4 , pp. 203-210
    • Korzhik, V.I.1    Morales-Luna, G.2
  • 32
    • 0034449415 scopus 로고    scopus 로고
    • Information-theoretically secure keyless authentication
    • Sorrento, Italy, Jun
    • V. Korjik and M. Bakin, "Information-theoretically secure keyless authentication," in Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, Jun. 2000, p. 20.
    • (2000) Proc. IEEE Int. Symp. Information Theory , pp. 20
    • Korjik, V.1    Bakin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.