메뉴 건너뛰기




Volumn , Issue , 2009, Pages 754-761

A note on information-theoretic secret key exchange over wireless channels

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ADVERSARY; ANALYTICAL RESULTS; AVERAGE NUMBERS; PERFORMANCE METRICES; SECRET KEY; WIRELESS CHANNEL;

EID: 77949631620     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ALLERTON.2009.5394934     Document Type: Conference Paper
Times cited : (6)

References (28)
  • 2
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - part i: Secret sharing
    • R. Ahlswede and I. Csiszar. Common randomness in information theory and cryptography - part i: Secret sharing. In IEEE Tran. on Information Theory, volume 39, pages 1121-1132, 1993.
    • (1993) IEEE Tran. on Information Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 5
    • 0037623983 scopus 로고    scopus 로고
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In SIAM J. Computing, pages 32(3): 586-615, 2003.
    • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In SIAM J. Computing, pages 32(3): 586-615, 2003.
  • 6
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszar and J. Korner. Broadcast channels with confidential messages. In IEEE Tran. on Information Theory, volume 24, pages 339-348, 1978.
    • (1978) IEEE Tran. on Information Theory , vol.24 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 9
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In SIAM Journal on Computing, volume 38, 2008.
    • (2008) SIAM Journal on Computing , vol.38
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 10
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D.Wyner. The wire-tap channel. In Bell Syst. Tech. J., volume 54, pages 1355-1367, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1367
    • Wyner, A.D.1
  • 12
    • 15344350656 scopus 로고    scopus 로고
    • An overview of public key cryptography
    • Martin E. Hellman. An overview of public key cryptography. In IEEE Communications Magazine, pages 42-49, 2002.
    • (2002) IEEE Communications Magazine , pp. 42-49
    • Hellman, M.E.1
  • 13
    • 0347337828 scopus 로고    scopus 로고
    • III. Secure space-time communication
    • A. O. Hero. III. Secure space-time communication. In IEEE Tran. on Information Theory, volume 49, pages 3235-3249, 2003.
    • (2003) IEEE Tran. on Information Theory , vol.49 , pp. 3235-3249
    • Hero, A.O.1
  • 17
    • 60449113417 scopus 로고    scopus 로고
    • Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In ACM Trans. on Sensor Networks, 5, issue 1, 2009.
    • Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In ACM Trans. on Sensor Networks, vol. 5, issue 1, 2009.
  • 20
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the diffie-hellman protocol and computing discrete logarithms
    • Springer-Verlag
    • U. Maurer. Towards the equivalence of breaking the diffie-hellman protocol and computing discrete logarithms. In Advances in Cryptology - Crypto '94, Springer-Verlag, pages 271-281, 1994.
    • (1994) Advances in Cryptology - Crypto '94 , pp. 271-281
    • Maurer, U.1
  • 21
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer. Secret key agreement by public discussion from common information. In IEEE Tran. on Information Theory, volume 39, pages 733-742, 1993.
    • (1993) IEEE Tran. on Information Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 22
    • 0037356065 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (discus): Design and construction
    • S.S. Pradhan and K. Ramchandran. Distributed source coding using syndromes (discus): design and construction. In IEEE Tran. on Information Theory, volume 49, pages 626-643, 2003.
    • (2003) IEEE Tran. on Information Theory , vol.49 , pp. 626-643
    • Pradhan, S.S.1    Ramchandran, K.2
  • 24
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. In Bell Syst. Tech. J., volume 28, pages 656-715, 1948.
    • (1948) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 25
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • D. Slepian and J. K. Wolf. Noiseless coding of correlated information sources. In IEEE Tran. on Information Theory, volume 19, pages 471-480, 1973.
    • (1973) IEEE Tran. on Information Theory , vol.19 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.