메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1288-1292

Perfect secrecy, perfect omniscience and steiner tree packing

Author keywords

[No Author keywords available]

Indexed keywords

COMBINATORIAL PROBLEM; CORRELATED SOURCES; MULTIGRAPHS; NETWORK MODELS; NOISELESS CHANNELS; NON-INTERACTIVE; PERFECT SECRECY; SECRET KEY; STEINER TREE PACKING; UPPER BOUND;

EID: 70449513070     PISSN: 21578102     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2009.5205948     Document Type: Conference Paper
Times cited : (3)

References (16)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory,vol. 39, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • March
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory,vol. 46, pp. 344-366, March 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 3
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • December
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inform. Theory,vol. 50, pp. 3047-3061, December 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 5
    • 0002924564 scopus 로고    scopus 로고
    • Packing Steiner trees: A cutting plane algorithm and computational results
    • February
    • M. Grötschel, A. Martin and R. Weismantel, "Packing Steiner trees: A cutting plane algorithm and computational results," Mathematical Programming,vol. 72, pp. 125-145, February 1996.
    • (1996) Mathematical Programming , vol.72 , pp. 125-145
    • Grötschel, M.1    Martin, A.2    Weismantel, R.3
  • 7
    • 33749446548 scopus 로고
    • Provably secure key distribution based on independent channels
    • presented at the ,Eindhoven, The Netherlands, June
    • U. M. Maurer, "Provably secure key distribution based on independent channels," presented at the IEEE Workshop Inform. Theory,Eindhoven, The Netherlands, June 1990.
    • (1990) IEEE Workshop Inform. Theory
    • Maurer, U.M.1
  • 8
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory,vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 9
    • 84881100274 scopus 로고
    • Edge disjoint spanning trees of finite graphs
    • C. St. J. A. Nash-Williams, "Edge disjoint spanning trees of finite graphs," J London Math. Soc.,36, pp. 445-450, 1961.
    • (1961) J London Math. Soc , vol.36 , pp. 445-450
    • Nash-Williams, C.S.J.A.1
  • 10
    • 52349096793 scopus 로고    scopus 로고
    • S. Nitinawarat, C. Ye, A. Barg, P. Narayan and A. Reznik,Secret key generation for a pairwise independent network model, Proceedings of the IEEE International Symposium on Information Theory,pp. 10151019, Toronto, Ontario, Canada, July 2008.
    • S. Nitinawarat, C. Ye, A. Barg, P. Narayan and A. Reznik,"Secret key generation for a pairwise independent network model," Proceedings of the IEEE International Symposium on Information Theory,pp. 10151019, Toronto, Ontario, Canada, July 2008.
  • 12
    • 84963041976 scopus 로고
    • On the problem of decomposing a graph into nconnected factors
    • W. T. Tutte, "On the problem of decomposing a graph into nconnected factors," J London Math. Soc.,36, pp. 221-230, 1961.
    • (1961) J London Math. Soc , vol.36 , pp. 221-230
    • Tutte, W.T.1
  • 13
    • 33745134676 scopus 로고    scopus 로고
    • A unification of network coding and tree-packing (routing) theorems
    • June
    • Y. Wu, K. Jain and S.-Y. Kung, "A unification of network coding and tree-packing (routing) theorems," IEEE Trans. Inform. Theory,vol. 52, pp. 2398-2409, June 2006.
    • (2006) IEEE Trans. Inform. Theory , vol.52 , pp. 2398-2409
    • Wu, Y.1    Jain, K.2    Kung, S.-Y.3
  • 14
    • 33749443558 scopus 로고    scopus 로고
    • Secret key and private key constructions for simple multiterminal source models
    • Adelaide, Australia, September
    • C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," Proceedings of the IEEE International Symposium on Information Theory,pp. 2133-2137, Adelaide, Australia, September 2005.
    • (2005) Proceedings of the IEEE International Symposium on Information Theory , pp. 2133-2137
    • Ye, C.1    Narayan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.