메뉴 건너뛰기




Volumn , Issue , 2007, Pages 21-44

Unbreakable keys from random noise

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77952412339     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-84628-984-2_2     Document Type: Chapter
Times cited : (31)

References (6)
  • 1
    • 84892222079 scopus 로고    scopus 로고
    • It should be mentioned that also unconditionally security is based on an assumption, namely that our probabilistic model of Nature is at least partially correct
    • It should be mentioned that also unconditionally security is based on an assumption, namely that our probabilistic model of Nature is (at least partially) correct.
  • 2
    • 84892335873 scopus 로고    scopus 로고
    • All logarithms are to base 2
    • All logarithms are to base 2.
  • 3
    • 84892205736 scopus 로고    scopus 로고
    • The concept of simulators in cryptographic security definitions has been introduced in 135
    • The concept of simulators in cryptographic security definitions has been introduced in [135].
  • 4
    • 84892217641 scopus 로고    scopus 로고
    • A→B denotes an authentic public channel for arbitrarily long messages
    • A→B denotes an authentic public channel for arbitrarily long messages.
  • 5
    • 84892295763 scopus 로고    scopus 로고
    • A secure sketch as defined in 91 can be seen as a special case of an information reconciliation protocol where the sketching and the recovery procedure correspond to Alice's and Bob's programs, respectively
    • A secure sketch as defined in [91] can be seen as a special case of an information reconciliation protocol where the sketching and the recovery procedure correspond to Alice's and Bob's programs, respectively.
  • 6
    • 84892247806 scopus 로고    scopus 로고
    • A fuzzy extractors as defined in 91 can generally be seen as a one-way keyagreement protocol where the generation and the reproduction procedure correspond to Alice's and Bob's programs, respectively. The helper string generated by the generation procedure of a secure sketch corresponds to the message sent from Alice to Bob in a one-way key-agreement protocol
    • A fuzzy extractors as defined in [91] can generally be seen as a one-way keyagreement protocol where the generation and the reproduction procedure correspond to Alice's and Bob's programs, respectively. The helper string generated by the generation procedure of a secure sketch corresponds to the message sent from Alice to Bob in a one-way key-agreement protocol.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.