메뉴 건너뛰기




Volumn 54, Issue 6, 2008, Pages 2437-2452

Secrecy capacities for multiterminal channel models

Author keywords

Multiple source; Multiterminal channel; Private key; Secrecy capacity; Secret key; Wiretap side information

Indexed keywords

COMMUNICATION;

EID: 45249104852     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.921705     Document Type: Article
Times cited : (139)

References (18)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 0029706655 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
    • (1996) Probl. Pered. Inform , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 7
    • 10644270917 scopus 로고    scopus 로고
    • The secret key capacity of multiple terminals
    • Dec
    • I. Csiszár and P. Narayan, "The secret key capacity of multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 9
    • 45249097538 scopus 로고    scopus 로고
    • Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals
    • Nice, France, Jun
    • A. Gohari and V. Anantharam, "Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals," in Proc. 2007 IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 2056-2060.
    • (2007) Proc. 2007 IEEE Int. Symp. Information Theory , pp. 2056-2060
    • Gohari, A.1    Anantharam, V.2
  • 11
    • 34447344072 scopus 로고    scopus 로고
    • Generalized entropy power inequalities and monotonicity properties of information
    • Jul
    • M. Madiman and A. Barron, "Generalized entropy power inequalities and monotonicity properties of information," IEEE Trans. Inf. Theory, vol. 53, no. 7, pp. 2317-2329, Jul. 2007.
    • (2007) IEEE Trans. Inf. Theory , vol.53 , Issue.7 , pp. 2317-2329
    • Madiman, M.1    Barron, A.2
  • 12
    • 33749446548 scopus 로고
    • Provably secure key distribution based on independent channels
    • presented at the, Eindhoven, The Netherlands, Jun
    • U. M. Maurer, "Provably secure key distribution based on independent channels," presented at the IEEE Workshop Information Theory, Eindhoven, The Netherlands, Jun. 1990.
    • (1990) IEEE Workshop Information Theory
    • Maurer, U.M.1
  • 13
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 14
    • 45249108187 scopus 로고    scopus 로고
    • U. M. Maurer, The strong secret key rate of discrete random triples, in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, Ed. et al. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
    • U. M. Maurer, "The strong secret key rate of discrete random triples," in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, Ed. et al. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
  • 15
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 16
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Proc. EUROCRYPT 2000 , Berlin, Germany: Springer-Verlag
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, pp. 352-368.
    • (2000) Lecture Notes in Computer Science , pp. 352-368
    • Maurer, U.M.1    Wolf, S.2
  • 17
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • Proc. EUROCRYPT 2003 , Berlin, Germany: Springer-Verlag
    • R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT 2003 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003, vol. 2656, pp. 526-577.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 526-577
    • Renner, R.1    Wolf, S.2
  • 18
    • 0016562514 scopus 로고
    • The wiretap channel
    • A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.