메뉴 건너뛰기




Volumn , Issue , 2008, Pages 742-746

New bounds on the information-theoretic key agreement of multiple terminals

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED COMMUNICATION; CHANNEL MODELLING; COMPUTATIONAL RESOURCES; CURRENT STATE; DISCRETE MEMORYLESS CHANNEL; DISTRIBUTED RANDOM VARIABLES; INTERNATIONAL SYMPOSIUM; KEY AGREEMENT; LOWER AND UPPER BOUNDS; LOWER BOUNDS; PUBLIC COMMUNICATIONS; SECRET KEY AGREEMENT; SECRET KEYS; SOURCE MODELING; UPPER BOUNDS;

EID: 52349099669     PISSN: 21578101     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2008.4595085     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. Part I: Secret sharing
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. Part I: Secret sharing", IEEE Trans. Inf. Th., Vol. 39, No. 4, pp. 1121-1132, 1993.
    • (1993) IEEE Trans. Inf. Th , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszár and J. Korner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Th., Vol. 24, No. 3, pp. 339-348, 1978.
    • (1978) IEEE Trans. Inf. Th , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Korner, J.2
  • 4
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy Capacities for Multiple Terminals
    • I. Csiszár and P. Narayan, "Secrecy Capacities for Multiple Terminals", IEEE Trans. Inf. Th., Vol. 50, No. 12, 3047-3061, 2004.
    • (2004) IEEE Trans. Inf. Th , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 5
    • 33749441153 scopus 로고    scopus 로고
    • Secrecy Capacities for Multiterminal Channel Models
    • I. Csiszár and P. Narayan, "Secrecy Capacities for Multiterminal Channel Models", Proc. IEEE Int. Symp. on Inf. Th., pp. 2138-2141, 2005.
    • (2005) Proc. IEEE Int. Symp. on Inf. Th , pp. 2138-2141
    • Csiszár, I.1    Narayan, P.2
  • 6
    • 45249097538 scopus 로고    scopus 로고
    • Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals
    • Amin A. Gohari and V. Anantharam, "Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals", Proc. IEEE Int. Symp. on Inf. Th., pp. 2056-2060, 2007.
    • (2007) Proc. IEEE Int. Symp. on Inf. Th , pp. 2056-2060
    • Gohari, A.A.1    Anantharam, V.2
  • 9
    • 0027599802 scopus 로고
    • Secret Key Agreement by Public Discussion From Common Information
    • Ueli M. Maurer, "Secret Key Agreement by Public Discussion From Common Information", IEEE Trans. Inf. Th., Vol. 39, No. 3, pp. 733-742, 1993.
    • (1993) IEEE Trans. Inf. Th , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 10
    • 0034450066 scopus 로고    scopus 로고
    • From Weak to Strong Information-Theoretic Key Agreement
    • Ueli M. Maurer and S. Wolf, "From Weak to Strong Information-Theoretic Key Agreement", Proc. IEEE Int. Symp. on Inf. Th., p. 18, 2000.
    • (2000) Proc. IEEE Int. Symp. on Inf. Th , pp. 18
    • Maurer, U.M.1    Wolf, S.2
  • 11
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Ueli M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information", IEEE Trans. Inf. Th., Vol. 45, No. 2, pp. 499-514, 1999.
    • (1999) IEEE Trans. Inf. Th , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 12
    • 35248888499 scopus 로고    scopus 로고
    • New Bounds in Secret-Key Agreement: The Gap Between Formation and Secrecy Extraction
    • Springer-Verlag
    • R. Renner and S. Wolf, "New Bounds in Secret-Key Agreement: The Gap Between Formation and Secrecy Extraction", Proc. EUROCRYPT 2003, vol. 2656, pp. 562-577, Springer-Verlag, 2003.
    • (2003) Proc. EUROCRYPT 2003 , vol.2656 , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 13
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C.E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 14
    • 0016562514 scopus 로고
    • The Wiretap Channel
    • A. D. Wyner, "The Wiretap Channel", Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.