메뉴 건너뛰기




Volumn 57, Issue 10, 2011, Pages 6337-6350

When is a function securely computable?

Author keywords

Aided secret key; balanced coloring lemma; function computation; maximum common function; omniscience; secret key capacity; secure computability

Indexed keywords

BALANCED COLORING LEMMA; MAXIMUM COMMON FUNCTION; OMNISCIENCE; SECRET KEY; SECURE COMPUTABILITY;

EID: 80053961199     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2011.2165807     Document Type: Article
Times cited : (53)

References (24)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 4
    • 0029706655 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár, "Almost independence and secrecy capacity," Prob. Pered. Inf. , vol. 32, no. 1, pp. 48-57, 1996.
    • (1996) Prob. Pered. Inf. , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1
  • 5
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 6
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 7
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 8
    • 0006932810 scopus 로고
    • Common information is far less than mutual information
    • P. Gács and J. Körner, "Common information is far less than mutual information," Probl. Contr. Inf. Theory, vol. 2, no. 2, pp. 149-162, 1973.
    • (1973) Probl. Contr. Inf. Theory , vol.2 , Issue.2 , pp. 149-162
    • Gács, P.1    Körner, J.2
  • 9
    • 0023981825 scopus 로고
    • Finding parity in a simple broadcast network
    • R. G. Gallager, "Finding parity in a simple broadcast network," IEEE Trans. Inf. Theory, vol. 34, no. 2, pp. 176-180, 1988.
    • (1988) IEEE Trans. Inf. Theory , vol.34 , Issue.2 , pp. 176-180
    • Gallager, R.G.1
  • 10
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals-Part I
    • A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.A.1    Anantharam, V.2
  • 11
    • 17144395505 scopus 로고    scopus 로고
    • Computing and communicating functions over sensor networks
    • A. Giridhar and P. Kumar, "Computing and communicating functions over sensor networks," IEEE J. Sel. Areas Commun., vol. 23, no. 4, pp. 755-764, 2005.
    • (2005) IEEE J. Sel. Areas Commun. , vol.23 , Issue.4 , pp. 755-764
    • Giridhar, A.1    Kumar, P.2
  • 12
    • 0018442936 scopus 로고
    • How to encode the modulo-two sum of binary sources
    • J. Korner and K. Marton, "How to encode the modulo-two sum of binary sources," IEEE Trans. Inf. Theory, vol. 25, no. 2, pp. 219-221, 1979.
    • (1979) IEEE Trans. Inf. Theory , vol.25 , Issue.2 , pp. 219-221
    • Korner, J.1    Marton, K.2
  • 13
    • 0003981320 scopus 로고
    • New York: Van Nostrand, 28-42
    • M. Loeve, Probability Theory. New York: Van Nostrand, 1955, pp. 157, 28-42.
    • (1955) Probability Theory , pp. 157
    • Loeve, M.1
  • 14
    • 70449514183 scopus 로고    scopus 로고
    • Information-theoretic bounds formultiround function computation in collocated networks
    • N. Ma, P. Ishwar, and P.Gupta, "Information-theoretic bounds formultiround function computation in collocated networks," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), 2009, pp. 2306-2310.
    • (2009) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 2306-2310
    • Ma, N.1    Ishwar, P.2    Gupta, P.3
  • 15
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 19
  • 20
    • 0015992185 scopus 로고
    • Recent results in the Shannon theory
    • A. D. Wyner, "Recent results in the Shannon theory," IEEE Trans. Inf. Theory, vol. 20, pp. 2-10, 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , pp. 2-10
    • Wyner, A.D.1
  • 21
    • 85039623622 scopus 로고
    • Some complexity questions related to distributive computing
    • A. C. Yao, "Some complexity questions related to distributive computing," in Proc. ACM Symp. on Theory of Comput. (STOC), 1979, pp. 209-213.
    • (1979) Proc. ACM Symp. on Theory of Comput. (STOC) , pp. 209-213
    • Yao, A.C.1
  • 23
    • 33749443558 scopus 로고    scopus 로고
    • Secret key and private key constructions for simple multiterminal source models
    • C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," in Proc. Int. Symp. Inf. Theory, 2005, pp. 2133-2137.
    • (2005) Proc. Int. Symp. Inf. Theory , pp. 2133-2137
    • Ye, C.1    Narayan, P.2
  • 24
    • 84856830966 scopus 로고    scopus 로고
    • Secret key and private constructions for simple multiterminal source models
    • accepted for publication
    • C. Ye and P. Narayan, "Secret key and private constructions for simple multiterminal source models," IEEE Trans. Inf. Theory, accepted for publication.
    • IEEE Trans. Inf. Theory
    • Ye, C.1    Narayan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.