메뉴 건너뛰기




Volumn 59, Issue 1, 2013, Pages 17-31

Secrecy generation for multiaccess channel models

Author keywords

Multiaccess channel; multiple keys; private key; private key capacity region; secrecy capacity; secret key; source emulation

Indexed keywords

CAPACITY REGIONS; MULTI ACCESS CHANNEL; MULTIPLE KEYS; PRIVATE KEY; SECRECY CAPACITY; SECRET KEY; SOURCE EMULATION;

EID: 84871761173     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2012.2216254     Document Type: Article
Times cited : (23)

References (24)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
  • 3
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J. M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.M.3
  • 5
    • 0019566096 scopus 로고
    • An achievable rate region for the multiple-access channel with feedback
    • May
    • T. M. Cover and C. S. K. Leung, "An achievable rate region for the multiple-access channel with feedback," IEEE Trans. Inf. Theory, vol. 27, no. 3, pp. 292-298, May 1981.
    • (1981) IEEE Trans. Inf. Theory , vol.27 , Issue.3 , pp. 292-298
    • Cover, T.M.1    Leung, C.S.K.2
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 9
    • 10644270917 scopus 로고    scopus 로고
    • The secret key capacity of multiple terminals
    • Dec
    • I. Csiszár and P. Narayan, "The secret key capacity of multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 10
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • Jun
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 11
    • 70449515425 scopus 로고    scopus 로고
    • Secrecy generation for multiple input multiple output channel models
    • Seoul, Korea, Jun./Jul
    • I. Csiszár and P. Narayan, "Secrecy generation for multiple input multiple output channel models," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun./Jul. 2009, pp. 2447-2451.
    • (2009) Proc IEEE Int. Symp. Inf. Theory , pp. 2447-2451
    • Csiszár, I.1    Narayan, P.2
  • 12
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals-Part I: Source model
    • Aug.
    • A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I: Source model," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.1    Anantharam, V.2
  • 13
    • 77954570193 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals-Part II: Channel model
    • Aug.
    • A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part II: Channel model," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3997-4010, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3997-4010
    • Gohari, A.1    Anantharam, V.2
  • 14
    • 84871739161 scopus 로고
    • Dependence balance bounds for multiple access channels with feedback and equal output two-way channels
    • Mierlo, The Netherlands May
    • A. P. Hekstra and F. M. J. Willems, "Dependence balance bounds for multiple access channels with feedback and equal output two-way channels," in Proc. Zesde Symp. Over Informatie Theory de Benelux, Mierlo, The Netherlands, May 1985, pp. 193-198.
    • (1985) Proc. Zesde Symp. over Informatie Theory de Benelux , pp. 193-198
    • Hekstra, A.P.1    Willems, F.M.J.2
  • 15
    • 34447344072 scopus 로고    scopus 로고
    • Generalized entropy power inequalities and monotonicity properties of information
    • DOI 10.1109/TIT.2007.899484
    • M. Madiman and A. Barron, "Generalized entropy power inequalities and monotonicity properties of information," IEEE Trans. Inf. Theory, vol. 53, no. 7, pp. 2317-2329, Jul. 2007. (Pubitemid 47061898)
    • (2007) IEEE Transactions on Information Theory , vol.53 , Issue.7 , pp. 2317-2329
    • Madiman, M.1    Barron, A.2
  • 16
    • 77957602848 scopus 로고    scopus 로고
    • Information inequalities for joint distributions, with interpretations and applications
    • Jun.
    • M. Madiman and P. Tetali, "Information inequalities for joint distributions, with interpretations and applications," IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 2699-2713, Jun. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.6 , pp. 2699-2713
    • Madiman, M.1    Tetali, P.2
  • 17
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 18
    • 0005059185 scopus 로고
    • The strong secret key rate of discrete random triples
    • R. E. Blahut D. J. Costello Jr., U. Maurer, and T. Mittelholzer, Eds. Norwell, MA: Kluwer ch. 26
    • U. M. Maurer, "The Strong Secret Key Rate of Discrete Random Triples," in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, D. J. Costello Jr., U. Maurer, and T. Mittelholzer, Eds. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
    • (1994) Communications and Cryptography: Two Sides of One Tapestry , pp. 271-285
    • Maurer, U.M.1
  • 19
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 20
    • 0009801824 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT, 2000, pp. 352-368.
    • (2000) Proc. EUROCRYPT , pp. 352-368
    • Maurer, U.M.1    Wolf, S.2
  • 21
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT, 2003, pp. 562-577.
    • (2003) Proc. EUROCRYPT , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 22
    • 0019343146 scopus 로고
    • The feedback capacity region of a class of discrete memoryless multiple access channels
    • Jan
    • F. M. J. Willems, "The feedback capacity region of a class of discrete memoryless multiple access channels," IEEE Trans. Inf. Theory, vol. 28, no. 1, pp. 93-95, Jan. 1982.
    • (1982) IEEE Trans. Inf. Theory , vol.28 , Issue.1 , pp. 93-95
    • Willems, F.M.J.1
  • 23
    • 0021518188 scopus 로고
    • On multiple access channels with feedback
    • Nov
    • F. M. J. Willems, "On multiple access channels with feedback," IEEE Trans. Inf. Theory, vol. 30, no. 6, pp. 842-845, Nov. 1984.
    • (1984) IEEE Trans. Inf. Theory , vol.30 , Issue.6 , pp. 842-845
    • Willems, F.M.J.1
  • 24
    • 0016562514 scopus 로고
    • The wiretap channel
    • A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.