메뉴 건너뛰기




Volumn E93-A, Issue 11, 2010, Pages 1976-1983

Secret key agreement from correlated gaussian sources by rate limited public communication

Author keywords

Bin coding; Gaussian sources; Privacy amplification; Quantization; Rate limited public communication; Secret key agreement

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; GAUSSIAN DISTRIBUTION;

EID: 78049508239     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E93.A.1976     Document Type: Conference Paper
Times cited : (43)

References (27)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-part I: Secret sharing, " IEEE Trans. Inf. Theory, vol.39, no.4, pp.1121-1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 1442337635 scopus 로고    scopus 로고
    • Reconciliation of a quantum-distributed Gaussian key
    • Feb.
    • G.V. Assche, J. Cardinal, and N.J. Cerf, "Reconciliation of a quantum-distributed Gaussian key, " IEEE Trans. Inf. Theory, vol.50, no.2, pp.394-400, Feb. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.2 , pp. 394-400
    • Assche, G.V.1    Cardinal, J.2    Cerf, N.J.3
  • 5
    • 0016037985 scopus 로고
    • A simple converse for broadcast channels with additive white Gaussian noise
    • March
    • P.P. Bergmans, "A simple converse for broadcast channels with additive white Gaussian noise, " IEEE Trans. Inf. Theory, vol.20, no.2, pp.279-280, March 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , Issue.2 , pp. 279-280
    • Bergmans, P.P.1
  • 8
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J.L. Carter and M.N. Wegman, "Universal classes of hash functions, " J. Comput. Syst. Sci., vol.18, pp.143-154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 10
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages, " IEEE Trans. Inf. Theory, vol.24, no.3, pp.339-348, May 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 11
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • March
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper, " IEEE Trans. Inf. Theory, vol.46, no.2, pp.344-366, March 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 12
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol.50, no.12, pp.3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 13
    • 0037448569 scopus 로고    scopus 로고
    • Quantum key distribution using Gaussian-modulated coherent states
    • Jan.
    • F. Grosshans, G.V. Assche, J. Wenger, R. Brouri, N.J. Cerf, and P. Grangier, "Quantum key distribution using Gaussian-modulated coherent states, " Nature, vol.421, pp.238-241, Jan. 2003.
    • (2003) Nature , vol.421 , pp. 238-241
    • Grosshans, F.1    Assche, G.V.2    Wenger, J.3    Brouri, R.4    Cerf, N.J.5    Grangier, P.6
  • 15
    • 0036614213 scopus 로고    scopus 로고
    • An information-spectrum approach to rate-distortion function with side information
    • June
    • K. Iwata and J. Muramatsu, "An information-spectrum approach to rate-distortion function with side information, " IEICE Trans. Fundamentals, vol.E85-A, no.6, pp.1387-1395, June 2002.
    • (2002) IEICE Trans. Fundamentals , vol.E85-A , Issue.6 , pp. 1387-1395
    • Iwata, K.1    Muramatsu, J.2
  • 17
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H.V. Poor, and S. Shamai, "Secure communication over fading channels, " IEEE Trans. Inf. Theory, vol.54, no.6, pp.2470- 2492, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 18
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multiple-antenna wiretap channel
    • June
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple-antenna wiretap channel, " IEEE Trans. Inf. Theory, vol.55, no.6, pp.2547-2553, June 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 19
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol.39, no.3, pp.733- 742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 20
    • 77952327973 scopus 로고    scopus 로고
    • Secret key agreement by soft-decision of signals in Gaussian Maurer's model
    • Feb., arXive:0804.2940v1
    • M. Naito, S. Watanabe, R. Matsumoto, and T. Uyematsu, "Secret key agreement by soft-decision of signals in Gaussian Maurer's model, " IEICE Trans. Fundamentals, vol.E92-A, no.2, pp.525-534, Feb. 2008. arXive:0804.2940v1.
    • (2008) IEICE Trans. Fundamentals , vol.E92-A , Issue.2 , pp. 525-534
    • Naito, M.1    Watanabe, S.2    Matsumoto, R.3    Uyematsu, T.4
  • 22
    • 0031272758 scopus 로고    scopus 로고
    • Gaussian multiterminal source coding
    • Nov.
    • Y. Oohama, "Gaussian multiterminal source coding, " IEEE Trans. Inf. Theory, vol.43, no.6, pp.1912-1923, Nov. 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.6 , pp. 1912-1923
    • Oohama, Y.1
  • 23
    • 0019178773 scopus 로고
    • On a source coding problem with two channels and three receivers
    • Dec.
    • L. Ozarow, "On a source coding problem with two channels and three receivers, " Bell Syst. Tech. J., vol.59, no.10, pp.1909-1921, Dec. 1980
    • (1980) Bell Syst. Tech. J. , vol.59 , Issue.10 , pp. 1909-1921
    • Ozarow, L.1
  • 24
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • July
    • D. Slepian and J.K. Wolf, "Noiseless coding of correlated information sources, " IEEE Trans. Inf. Theory, vol.IT-19, no.4, pp.471-480, July 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.IT-19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 25
    • 70349626788 scopus 로고    scopus 로고
    • Remote vector Gaussian source coding with decoder side information under mutual information and distortion constraints
    • Oct.
    • C. Tian and J. Chen, "Remote vector Gaussian source coding with decoder side information under mutual information and distortion constraints, " IEEE Trans. Inf. Theory, vol.55, no.10, pp.4676-4680, Oct. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.10 , pp. 4676-4680
    • Tian, C.1    Chen, J.2
  • 26
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A.D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol.54, no.8, pp.1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 27
    • 0016882596 scopus 로고
    • The rate-distortion function for source coding with side information at the decoder
    • Jan.
    • A.D.Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder, " IEEE Trans. Inf. Theory, vol.IT-22, no.1, pp.1-10, Jan. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.1 , pp. 1-10
    • Wyner, A.D.1    Ziv, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.