메뉴 건너뛰기




Volumn E92-A, Issue 2, 2009, Pages 525-534

Secret key agreement by soft-decision of signals in Gaussian Maurer's Model

Author keywords

Advantage distillation; AWGN; Information theoretic security; Key agreement; Privacy amplification; Public discussion

Indexed keywords

DISTILLATION; GAUSSIAN DISTRIBUTION; INFORMATION THEORY;

EID: 77952327973     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E92.A.525     Document Type: Article
Times cited : (23)

References (24)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part 1: Secret sharing
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-part 1: Secret sharing," IEEE Trans. Inf. Theory, vol.39, no.4, pp.1121-1132, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 2
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipat fading channel
    • Nov.
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipat fading channel," IEEE Trans. Antennas Propag., vol.53, no.11, pp.3776-3784, Nov. 2005.
    • (2005) IEEE Trans. Antennas Propag. , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 4
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • April
    • C.H. Bennett, G. Brassard, and J.M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol.17, no.2, pp.210-229, April 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.M.3
  • 5
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J.L. Carter and M.N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol.18, pp.143-154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 6
    • 33746621346 scopus 로고    scopus 로고
    • Lowcomplexity approaches to Slepian & Wolf near-lossless distributed data compression
    • Aug.
    • T.P. Coleman, A.H. Lee, M. Médard, and M. Effros, "Lowcomplexity approaches to Slepian & Wolf near-lossless distributed data compression," IEEE Trans. Inf. Theory, vol.52, no.8, pp.3546-3561, Aug. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.8 , pp. 3546-3561
    • Coleman, T.P.1    Lee, A.H.2    Médard, M.3    Effros, M.4
  • 8
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol.24, no.3, pp.339-348, May 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 9
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol.50, no.12, pp.3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 16
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol.39, no.3, pp.733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 18
    • 26844487465 scopus 로고    scopus 로고
    • Low-density parity-check matrices for coding of correlated sources
    • Oct.
    • J. Muramatsu, T. Uyematsu, and T. Wadayama, "Low-density parity-check matrices for coding of correlated sources," IEEE Trans. Inf. Theory, vol.51, no.10, pp.3645-3654, Oct. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.10 , pp. 3645-3654
    • Muramatsu, J.1    Uyematsu, T.2    Wadayama, T.3
  • 19
    • 45249088577 scopus 로고    scopus 로고
    • The commitment capacity of the gaussian channel is infinite
    • July
    • A.C.A. Nascimento, J. Barros, S. Skludarek, and H. Imai, "The commitment capacity of the gaussian channel is infinite," IEEE Trans. Inf. Theory, vol.54, no.6, pp.2785-2789, July 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2785-2789
    • Nascimento, A.C.A.1    Barros, J.2    Skludarek, S.3    Imai, H.4
  • 20
    • 33846181385 scopus 로고    scopus 로고
    • Ph.D. Thesis, Dipl. Phys. ETH, Switzerland. arXiv:quant-ph/0512258
    • R. Renner, Security of quantum key distribution, Ph.D. Thesis, Dipl. Phys. ETH, Switzerland, 2005. arXiv:quant-ph/0512258.
    • (2005) Security of Quantum Key Distribution
    • Renner, R.1
  • 21
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • July
    • D. Slepian and J.K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol.19, no.4, pp.471-480, July 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 24
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A.D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol.54, no.8, pp.1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.