메뉴 건너뛰기




Volumn 1233, Issue , 1997, Pages 209-225

Information-theoretically secure secret-key agreement by not authenticated public discussion

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY; NETWORK SECURITY; QUANTUM CRYPTOGRAPHY;

EID: 77951458752     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-69053-0_15     Document Type: Conference Paper
Times cited : (79)

References (25)
  • 1
    • 0027629488 scopus 로고
    • Common Randomness in information theory and cryptography-part I: Secret sharing
    • R. Ahlswede and I. Csiszar, Common Randomness in information theory and cryptography-part I: secret sharing, IEEE Transactions on Information Theory, Vol. IT-39, 1993, pp. 1121-1132.
    • (1993) IEEE Transactions on Information Theory , vol.39 IT , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 4
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C.H. Bennett, G. Brassard and J.-M. Robert, “Privacy amplification by public discussion”, SIAM Journal on Computing, Vol. 17, no. 2, April 1988, pp. 210-229.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 8
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszar and J. Korner, “Broadcast channels with confidential messages”, IEEE Transactions on Information Theory, Vol. IT-24, no. 3, 1978, pp. 339-348.
    • (1978) IEEE Transactions on Information Theory , vol.24 IT , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 13
    • 78149248764 scopus 로고
    • Protocols for secret key agreement by public discussion based on common information
    • Berlin: Springer-Verlag
    • U.M. Maurer, Protocols for secret key agreement by public discussion based on common information, Advances in Cryptology-CRYPTO’92, Lecture Notes in Computer Science, Berlin: Springer-Verlag, vol. 740, pp. 461-470, 1993.
    • (1993) Advances in Cryptology-CRYPTO’92, Lecture Notes in Computer Science , vol.740 , pp. 461-470
    • Maurer, U.M.1
  • 14
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol. IT-39, 1993, pp. 733-742.
    • (1993) IEEE Transactions on Information Theory , vol.39 IT , pp. 733-742
    • Maurer, U.M.1
  • 15
    • 0005059185 scopus 로고
    • The strong secret key rate of discrete random triples
    • E. Blahut et al. (editors), Kluwer Academic Publishers
    • U. M. Maurer, The strong secret key rate of discrete random triples, Communications and Cryptography, Two Sides of one Tapestry, R.E. Blahut et al. (editors), Kluwer Academic Publishers, 1994, pp. 271-285.
    • (1994) Communications and Cryptography, Two Sides of One Tapestry , pp. 271-285
    • Maurer, U.M.1
  • 16
    • 0030232808 scopus 로고    scopus 로고
    • A calculus for security bootstrapping in distributed systems
    • U. M. Maurer and P.E. Schmid, A calculus for security bootstrapping in distributed systems, Journal of Computer Security, vol. 4, no. 1, pp. 55-80, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.1 , pp. 55-80
    • Maurer, U.M.1    Schmid, P.E.2
  • 17
    • 21444457448 scopus 로고    scopus 로고
    • Towards characterizing when information-theoretic secret key agreement is possible
    • K. Kim and T. Matsumoto (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
    • U. M. Maurer and S. Wolf, Towards characterizing when information-theoretic secret key agreement is possible, Advances in Cryptology-ASIACRYPT’96, K. Kim and T. Matsumoto (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, vol. 1163, pp. 145-158, 1996.
    • (1996) Advances in Cryptology-ASIACRYPT’96 , vol.1163 , pp. 145-158
    • Maurer, U.M.1    Wolf, S.2
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 21
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, October 1949, pp. 656-715.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 22
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag
    • G. J. Simmons, Authentication theory/coding theory, in Advances in Cryptology-CRYPTO 84, G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag, 1985, pp. 411-431.
    • (1985) Advances in Cryptology-Crypto 84 , pp. 411-431
    • Simmons, G.J.1
  • 24
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 25
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, no. 8, 1975, pp. 1355-1387.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.