메뉴 건너뛰기




Volumn , Issue , 2012, Pages 298-308

Non-malleable extractors with short seeds and applications to privacy amplification

Author keywords

extractors; non malleable extractors; privacy amplification

Indexed keywords

ARBITRARY CONSTANTS; ARBITRARY FUNCTIONS; ASYMPTOTICALLY OPTIMAL; CLASSICAL PROBLEMS; COMMUNICATION COMPLEXITY; ENTROPY LOSS; EXPLICIT CONSTRUCTIONS; EXTRACTORS; ITS EFFICIENCIES; MIN-ENTROPY RATE; NON-MALLEABILITY; NON-MALLEABLE; POLY-LOGARITHMIC COMMUNICATION; PRIME NUMBER; PRIVACY AMPLIFICATION;

EID: 84866504943     PISSN: 10930159     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCC.2012.21     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 3
    • 0023985539 scopus 로고
    • Privacy Amplification by Public Discussion
    • C. H. Bennett and G. Brassard and J. M. Robert, Privacy Amplification by Public Discussion, SIAM J. Comput. 17(2): 210-229, 1988
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.M.3
  • 5
    • 0023985259 scopus 로고
    • Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
    • B. Chor and O. Goldreich, Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity, SIAM J. on Computing 17(2): 230-261, 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 6
    • 33749541274 scopus 로고    scopus 로고
    • Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
    • Y. Dodis and J. Katz and L. Reyzin and A. Smith, Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, Advance in Cryptology - CRYPTO '06: 232-250, 2006.
    • (2006) Advance in Cryptology - CRYPTO '06 , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 10
    • 68549120859 scopus 로고    scopus 로고
    • Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
    • V. Guruswami and C. Umans and S. Vadhan, Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes, Journal of the ACM (JACM) 56(4): 1-34, 2009.
    • (2009) Journal of the ACM (JACM) , vol.56 , Issue.4 , pp. 1-34
    • Guruswami, V.1    Umans, C.2    Vadhan, S.3
  • 13
    • 78149248764 scopus 로고
    • Protocols for Secret Key Agreement by Public Discussion Based on Common Information
    • U. M. Maurer, Protocols for Secret Key Agreement by Public Discussion Based on Common Information, Advance in Cryptology - CRYPTO '92: 461-470, 1992.
    • (1992) Advance in Cryptology - CRYPTO '92 , pp. 461-470
    • Maurer, U.M.1
  • 14
    • 77951458752 scopus 로고    scopus 로고
    • Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion
    • U. M. Maurer, Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion, Advance in Cryptology - EUROCRYPT '97: 209-225, 1997.
    • (1997) Advance in Cryptology - EUROCRYPT '97 , pp. 209-225
    • Maurer, U.M.1
  • 15
    • 0037396951 scopus 로고    scopus 로고
    • EmphSecret-key agreement over unauthenticated public channels III: Privacy amplification
    • U. M. Maurer and S. Wolf, emphSecret-key agreement over unauthenticated public channels III: Privacy amplification, IEEE Transactions on Information Theory 49(4): 839-851, 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 16
    • 84958670019 scopus 로고    scopus 로고
    • Privacy Amplification Secure Against Active Adversaries
    • U. M. Maurer and S. Wolf, Privacy Amplification Secure Against Active Adversaries, Advance in Cryptology - CRYPTO '97: 307-321, 1997.
    • (1997) Advance in Cryptology - CRYPTO '97 , pp. 307-321
    • Maurer, U.M.1    Wolf, S.2
  • 17
    • 0027641832 scopus 로고
    • Small-Bias Probability Spaces: Efficient Constructions and Applications
    • J. Naor and M. Naor, Small-Bias Probability Spaces: Efficient Constructions and Applications, SIAM J. on Computing 22(4): 838-856, 1993.
    • (1993) SIAM J. on Computing , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 20
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret
    • R. Renner and S. Wolf, Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret, Advance in Cryptology - CRYPTO '03: 78-95, 2003.
    • (2003) Advance in Cryptology - CRYPTO '03 , pp. 78-95
    • Renner, R.1    Wolf, S.2
  • 21
    • 84947780088 scopus 로고    scopus 로고
    • Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement
    • S. Wolf, Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement, Advance in Cryptology - ASIACRYPT '98: 405-419, 1998.
    • (1998) Advance in Cryptology - ASIACRYPT '98 , pp. 405-419
    • Wolf, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.