메뉴 건너뛰기




Volumn 57, Issue 6, 2011, Pages 3989-4001

Exponential decreasing rate of leaked information in universal random privacy amplification

Author keywords

Exponential rate; nonasymptotic setting; secret key agreement; universal hash function; wire tap channel

Indexed keywords

EXPONENTIAL RATES; NONASYMPTOTIC SETTING; SECRET KEY AGREEMENT; UNIVERSAL HASH FUNCTION; WIRE-TAP CHANNEL;

EID: 79957636296     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2011.2110950     Document Type: Article
Times cited : (267)

References (22)
  • 1
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 733-742
    • Maurer, U.1
  • 2
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography part 1: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography part 1: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • L. Carter and M. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, no. 2, pp. 143-154, 1979.
    • (1979) J. Comput. Syst. Sci. , vol.18 , Issue.2 , pp. 143-154
    • Carter, L.1    Wegman, M.2
  • 8
    • 33645727315 scopus 로고    scopus 로고
    • General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and its application to wire-tap channel
    • Apr.
    • M. Hayashi, "General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and its application to wire-tap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 9
    • 0020152857 scopus 로고
    • Algebraic constructions of Shannon codes for regular channels
    • P. Delsarte and P. Piret, "Algebraic constructions of Shannon codes for regular channels," IEEE Trans. Inf. Theory, vol. 28, no. 4, pp. 593-599, Apr. 1982. (Pubitemid 12525111)
    • (1982) IEEE Transactions on Information Theory , vol.IT-28 , Issue.4 , pp. 593-599
    • Delsarte Philippe1    Piret Philippe2
  • 10
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell. Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell. Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 11
    • 12444299059 scopus 로고    scopus 로고
    • The private classical capacity and quantum capacity of a quantum channel
    • DOI 10.1109/TIT.2004.839515
    • I. Devetak, "The private classical information capacity and quantum information capacity of a quantum channel," IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 44-55, Jan. 2005. (Pubitemid 40145986)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.1 , pp. 44-55
    • Devetak, I.1
  • 12
    • 23944463739 scopus 로고    scopus 로고
    • Commitment capacity of discrete memoryless channels
    • Berlin, Germany, LNCS 2989 Springer, cs.CR/0304014 (2003)
    • A. Winter, A. C. A. Nascimento, and H. Imai, "Commitment capacity of discrete memoryless channels," in Proc. 9th Cirencester Crypto and Coding Conf, Berlin, Germany, 2003, pp. 35-51, LNCS 2989, Springer, cs.CR/0304014 (2003).
    • (2003) Proc. 9th Cirencester Crypto and Coding Conf , pp. 35-51
    • Winter, A.1    Nascimento, A.C.A.2    Imai, H.3
  • 14
    • 33846181385 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dipl. Phys. ETH, Switzerland, arXiv:quantph/0512258
    • R. Renner, "Security of QuantumKey Distribution," Ph.D. dissertation, Dipl. Phys. ETH, Switzerland, 2005, arXiv:quantph/0512258.
    • (2005) Security of Quantum Key Distribution
    • Renner, R.1
  • 17
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár, "Almost independence and secrecy capacity," Probl. Inf. Transm., vol. 32, no. 1, pp. 40-47, 1996.
    • (1996) Probl. Inf. Transm. , vol.32 , Issue.1 , pp. 40-47
    • Csiszár, I.1
  • 18
    • 77952327973 scopus 로고    scopus 로고
    • Secret key agreement by soft-decision of signals in Gaussian Maurer's model
    • M. Naito, S. Watanabe, R. Matsumoto, and T. Uyematsu, "Secret key agreement by soft-decision of signals in Gaussian Maurer's model," IEICE Trans. Fundam., vol. 92, no. 2, pp. 525-534, 2009.
    • (2009) IEICE Trans. Fundam. , vol.92 , Issue.2 , pp. 525-534
    • Naito, M.1    Watanabe, S.2    Matsumoto, R.3    Uyematsu, T.4
  • 20
    • 79957643904 scopus 로고    scopus 로고
    • private communication
    • S. Watanabe, 2007, private communication.
    • (2007)
    • Watanabe, S.1
  • 21
    • 0035163054 scopus 로고    scopus 로고
    • Universal composable security: A new paradigm for cryptographic protocols
    • Oct.
    • R. Cannetti, "Universal composable security: A new paradigm for cryptographic protocols," in Proc. 42nd IEEE FOCS, Oct. 2001, pp. 136-145.
    • (2001) Proc. 42nd IEEE FOCS , pp. 136-145
    • Cannetti, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.