메뉴 건너뛰기




Volumn 7417 LNCS, Issue , 2012, Pages 294-311

Semantic security for the wiretap channel

Author keywords

entropy; extractors; Information theoretic security

Indexed keywords

ENCRYPTION AND DECRYPTION; EXPLICIT SCHEME; EXTRACTORS; INFORMATION-THEORETIC SECURITY; MUTUAL INFORMATIONS; OPTIMAL RATE; PARALLEL DEVELOPMENT; POLYNOMIAL-TIME; SEMANTIC SECURITY; WIRETAP CHANNEL;

EID: 84865478919     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32009-5_18     Document Type: Conference Paper
Times cited : (196)

References (42)
  • 2
    • 67650099990 scopus 로고    scopus 로고
    • Channel polarization: A method for constructing capacity achieving codes for symmetric binary-input memoryless channels
    • Arikan, E.: Channel polarization: A method for constructing capacity achieving codes for symmetric binary-input memoryless channels. IEEE Transactions on Information Theory 55(7), 3051-3073 (2009)
    • (2009) IEEE Transactions on Information Theory , vol.55 , Issue.7 , pp. 3051-3073
    • Arikan, E.1
  • 3
    • 0031351741 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption
    • IEEE Computer Society Press October
    • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS, pp. 394-403. IEEE Computer Society Press (October 1997)
    • (1997) 38th FOCS , pp. 394-403
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 4
    • 84865467916 scopus 로고    scopus 로고
    • Polynomial-time, semantically-secure encryption achieving the secrecy capacity
    • Available as arxiv.org/abs/1201.3160 and Eprint Archive Report 2012/022 January
    • Bellare, M., Tessaro, S.: Polynomial-time, semantically-secure encryption achieving the secrecy capacity. Available as arxiv.org/abs/1201.3160 and Cryptology Eprint Archive Report 2012/022 (January 2012)
    • (2012) Cryptology
    • Bellare, M.1    Tessaro, S.2
  • 5
    • 84865447746 scopus 로고    scopus 로고
    • A cryptographic treatment of the wiretap channel
    • Available as arxiv.org/abs/1201.2205 and Eprint Archive Report 2012/15 January
    • Bellare, M., Tessaro, S., Vardy, A.: A cryptographic treatment of the wiretap channel. Available as arxiv.org/abs/1201.2205 and Cryptology Eprint Archive Report 2012/15 (January 2012)
    • (2012) Cryptology
    • Bellare, M.1    Tessaro, S.2    Vardy, A.3
  • 12
    • 0000489740 scopus 로고
    • Information-type measures of difference of probability distributions and indirect observations
    • Csiszár, I.: Information-type measures of difference of probability distributions and indirect observations. Studia Scientiarum Mathematicarum Hungarica 2, 299-318 (1967)
    • (1967) Studia Scientiarum Mathematicarum Hungarica , vol.2 , pp. 299-318
    • Csiszár, I.1
  • 13
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • Csiszár, I.: Almost independence and secrecy capacity. Problems of Information Transmission 32(1), 40-47 (1996)
    • (1996) Problems of Information Transmission , vol.32 , Issue.1 , pp. 40-47
    • Csiszár, I.1
  • 16
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38(1), 97-139 (2008)
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 17
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 18
    • 0001173821 scopus 로고    scopus 로고
    • Concatenated codes and their multilevel generalizations
    • Elsevier
    • Dumer, I.: Concatenated codes and their multilevel generalizations. In: The Handbook of Coding Theory, pp. 1191-1988. Elsevier (1998)
    • (1998) The Handbook of Coding Theory , pp. 1191-1988
    • Dumer, I.1
  • 22
    • 78649397864 scopus 로고    scopus 로고
    • The interplay between entropy and variational distance
    • Ho, S., Yeung, R.: The interplay between entropy and variational distance. IEEE Transactions on Information Theory 56(12), 5906-5929 (2010)
    • (2010) IEEE Transactions on Information Theory , vol.56 , Issue.12 , pp. 5906-5929
    • Ho, S.1    Yeung, R.2
  • 30
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Mahdavifar, H., Vardy, A.: Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Transactions on Information Theory 57(10), 6428-6443 (2011)
    • (2011) IEEE Transactions on Information Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 31
    • 0005059185 scopus 로고
    • The strong secret key rate of discrete random triples
    • Blahut, R.E. (ed.) Kluwer
    • Maurer, U.: The strong secret key rate of discrete random triples. In: Blahut, R.E. (ed.) Communication and Cryptography - Two Sides of One Tapestry, pp. 271-285. Kluwer (1994)
    • (1994) Communication and Cryptography - Two Sides of One Tapestry , pp. 271-285
    • Maurer, U.1
  • 32
    • 84948960386 scopus 로고    scopus 로고
    • Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Maurer, U.M., Wolf, S.: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351-368. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 351-368
    • Maurer, U.M.1    Wolf, S.2
  • 34
    • 85017588958 scopus 로고
    • Wire-Tap Channel II
    • Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. Springer, Heidelberg
    • Ozarow, L.H., Wyner, A.D.: Wire-Tap Channel II. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 33-50. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.209 , pp. 33-50
    • Ozarow, L.H.1    Wyner, A.D.2
  • 36
    • 33646767482 scopus 로고    scopus 로고
    • Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
    • Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
    • Renner, R., Wolf, S.: Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 199-216. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 199-216
    • Renner, R.1    Wolf, S.2
  • 41
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner, A.D.: The wire-tap channel. Bell Systems Tech. Journal 54(8), 1355-1387 (1975)
    • (1975) Bell Systems Tech. Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 42
    • 84865457738 scopus 로고    scopus 로고
    • Ziva corporation, http://www.ziva-corp.com/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.