메뉴 건너뛰기




Volumn , Issue , 2011, Pages 723-726

Linear perfect secret key agreement

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK LENGTHS; FINITE BLOCK LENGTH; MULTI TERMINALS; SECRECY CAPACITY; SECRET KEY AGREEMENT; SOURCE MODELS; UPPER BOUND;

EID: 83655191085     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITW.2011.6089530     Document Type: Conference Paper
Times cited : (29)

References (25)
  • 1
    • 84855255474 scopus 로고    scopus 로고
    • publications, http://goo.gl/4YZLT
    • C. Chan, publications. http://chungc.net63.net/pub, http://goo.gl/4YZLT.
    • Chan, C.1
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 4
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • June
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2437-2452, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 6
    • 80054797796 scopus 로고    scopus 로고
    • Ph. D. dissertation, Massachusetts Institute of Technology, see 1
    • C. Chan, "Generating secret in a network," Ph. D. dissertation, Massachusetts Institute of Technology, 2010, see [1].
    • (2010) Generating Secret in a Network
    • Chan, C.1
  • 10
    • 78649383176 scopus 로고    scopus 로고
    • Perfect omniscience, perfect secrecy, and steiner tree packing
    • December
    • S. Nitinawarat and P. Narayan, "Perfect omniscience, perfect secrecy, and steiner tree packing," IEEE Transactions on Information Theory, vol. 56, no. 12, pp. 6490-6500, December 2010.
    • (2010) IEEE Transactions on Information Theory , vol.56 , Issue.12 , pp. 6490-6500
    • Nitinawarat, S.1    Narayan, P.2
  • 14
    • 0042329697 scopus 로고    scopus 로고
    • On decomposing a hypergraph into k-connected sub-hypergraphs
    • September
    • A. Frank, T. Király, and M. Kriesell, "On decomposing a hypergraph into k-connected sub-hypergraphs," Discrete Applied Mathematics, vol. 131, no. 2, pp. 373-383, September 2003.
    • (2003) Discrete Applied Mathematics , vol.131 , Issue.2 , pp. 373-383
    • Frank, A.1    Király, T.2    Kriesell, M.3
  • 15
    • 84855281783 scopus 로고    scopus 로고
    • Decompositions and orientations of hypergraphs
    • Department of Mathematics and Computer Science, University of Southern Denmark, May
    • J. Bang-Jensen and S. Thomassé, "Decompositions and orientations of hypergraphs," Preprint no. 10, Department of Mathematics and Computer Science, University of Southern Denmark, May 2001.
    • (2001) Preprint No. 10
    • Bang-Jensen, J.1    Thomassé, S.2
  • 16
    • 79957890468 scopus 로고    scopus 로고
    • Wireless network information flow: A deterministic approach
    • vol. Abs/cs/0906.5394
    • A. S. Avestimehr, S. N. Diggavi, and D. N. C. Tse, "Wireless network information flow: A deterministic approach," CoRR, vol. Abs/cs/0906.5394, 2009.
    • (2009) CoRR
    • Avestimehr, A.S.1    Diggavi, S.N.2    Tse, D.N.C.3
  • 23
    • 83655175354 scopus 로고    scopus 로고
    • When is a function securely computable?
    • vol. Abs/1007.2945
    • H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" CoRR, vol. Abs/1007.2945, 2010.
    • (2010) CoRR
    • Tyagi, H.1    Narayan, P.2    Gupta, P.3
  • 25
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • January
    • U. M. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, pp. 53-66, January 1992.
    • (1992) J. Cryptol. , vol.5 , pp. 53-66
    • Maurer, U.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.