메뉴 건너뛰기




Volumn , Issue , 2010, Pages 785-794

Privacy amplification with asymptotically optimal entropy loss

Author keywords

entropy loss; information theoretic key agreement; privacy amplification

Indexed keywords

ASYMPTOTICALLY OPTIMAL; COMPUTATIONAL ASSUMPTIONS; CONSTANT FACTORS; CRYPTOGRAPHIC PROTOCOLS; EDIT DISTANCE; ENTROPY LOSS; ERROR CORRECTING CODE; KEY AGREEMENT; KEY AGREEMENT PROTOCOL; NONUNIFORM; PARTIAL KNOWLEDGE; PRIVACY AMPLIFICATION; SECURITY DEVICES; SECURITY PARAMETERS;

EID: 77954731169     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1806689.1806796     Document Type: Conference Paper
Times cited : (34)

References (22)
  • 3
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, Springer-Verlag
    • X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith. Secure remote authentication using biometric data. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, volume 3494 of LNCS, pages 147-163. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 5
    • 33749541274 scopus 로고    scopus 로고
    • Robust fuzzy extractors and authenticated key agreement from close secrets
    • C. Dwork, editor, Advances in Cryptology - CRYPTO 2006, Springer-Verlag, 20-24 Aug.
    • Y. Dodis, J. Katz, L. Reyzin, and A. Smith. Robust fuzzy extractors and authenticated key agreement from close secrets. In C. Dwork, editor, Advances in Cryptology - CRYPTO 2006, volume 4117 of LNCS, pages 232-250. Springer-Verlag, 20-24 Aug. 2006.
    • (2006) LNCS , vol.4117 , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • arXiv:cs/0602007
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1):97-139, 2008. arXiv:cs/0602007.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 70350700885 scopus 로고    scopus 로고
    • Non-malleable extractors and symmetric key cryptography from weak secrets
    • Bethesda, Maryland, 31 May-2 June
    • Y. Dodis and D. Wichs. Non-malleable extractors and symmetric key cryptography from weak secrets. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pages 601-610, Bethesda, Maryland, 31 May-2 June 2009.
    • (2009) Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing , pp. 601-610
    • Dodis, Y.1    Wichs, D.2
  • 10
    • 52149090133 scopus 로고    scopus 로고
    • An improved robust fuzzy extractor
    • R. Ostrovsky, R. D. Prisco, and I. Visconti, editors, Sixth Conference on Security and Cryptography in Networks SCN '08, Sept.
    • B. Kanukurthi and L. Reyzin. An improved robust fuzzy extractor. In R. Ostrovsky, R. D. Prisco, and I. Visconti, editors, Sixth Conference on Security and Cryptography in Networks SCN '08, volume 5229 of LNCS, pages 206-223, Sept. 2008.
    • (2008) LNCS , vol.5229 , pp. 206-223
    • Kanukurthi, B.1    Reyzin, L.2
  • 12
    • 67650671123 scopus 로고    scopus 로고
    • Key agreement from close secrets over unsecured channels
    • A. Joux, editor, Advances in Cryptology - EUROCRYPT 2009, Springer
    • B. Kanukurthi and L. Reyzin. Key agreement from close secrets over unsecured channels. In A. Joux, editor, Advances in Cryptology - EUROCRYPT 2009, volume 5479 of LNCS. Springer, 2009.
    • LNCS , vol.5479 , pp. 2009
    • Kanukurthi, B.1    Reyzin, L.2
  • 13
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions and reversals
    • Feb.
    • V. I. Levenshtein. Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady, 10:707-710, Feb. 1966.
    • (1966) Soviet Physics Doklady , vol.10 , pp. 707-710
    • Levenshtein, V.I.1
  • 14
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by NOT authenticated public discussion
    • W. Fumy, editor, Advances in Cryptology - EUROCRYPT 97, Springer-Verlag
    • U. Maurer. Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT 97, volume 1233 of LNCS, pages 209-225. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1233 , pp. 209-225
    • Maurer, U.1
  • 15
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • B. S. Kaliski, Jr., editor, Advances in Cryptology - CRYPTO '97, Springer-Verlag
    • U. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In B. S. Kaliski, Jr., editor, Advances in Cryptology - CRYPTO '97, volume 1294 of LNCS, pages 307-321. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 307-321
    • Maurer, U.1    Wolf, S.2
  • 16
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
    • U. Maurer and S. Wolf. Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification. IEEE Trans. Info. Theory, 49(4):839-851, 2003.
    • (2003) IEEE Trans. Info. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 18
    • 0002956996 scopus 로고    scopus 로고
    • Bounds for dispersers, extractors, and depth-two superconcentrators
    • J. Radhakrishnan and A. Ta-Shma. Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Computing, 13(1):2-24, 2000.
    • (2000) SIAM Journal on Computing , vol.13 , Issue.1 , pp. 2-24
    • Radhakrishnan, J.1    Ta-Shma, A.2
  • 19
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional authenticity and privacy from an arbitrarily weak secret
    • D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, Springer-Verlag
    • R. Renner and S. Wolf. Unconditional authenticity and privacy from an arbitrarily weak secret. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 78-95. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2729 , pp. 78-95
    • Renner, R.1    Wolf, S.2
  • 20
    • 27144457211 scopus 로고    scopus 로고
    • The exact price for unconditionally secure asymmetric cryptography
    • C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Springer-Verlag
    • R. Renner and S. Wolf. The exact price for unconditionally secure asymmetric cryptography. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 109-125. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 109-125
    • Renner, R.1    Wolf, S.2
  • 21
    • 0033349233 scopus 로고    scopus 로고
    • Asymptotically good codes correcting insertions, deletions, and transpositions
    • L. J. Schulman and D. Zuckerman. Asymptotically good codes correcting insertions, deletions, and transpositions. IEEE Transactions on Information Theory, 45(7):2552-2557, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.7 , pp. 2552-2557
    • Schulman, L.J.1    Zuckerman, D.2
  • 22
    • 84947780088 scopus 로고    scopus 로고
    • Strong security against active attacks in information-theoretic secret-key agreement
    • K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, Springer-Verlag
    • S. Wolf. Strong security against active attacks in information-theoretic secret-key agreement. In K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, volume 1514 of LNCS, pages 405-419. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1514 , pp. 405-419
    • Wolf, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.