-
1
-
-
84888077692
-
On common information and related characteristics of correlated information sources
-
R. Ahlswede and J. Körner, "On common information and related characteristics of correlated information sources," in Proc. 7th Prague Conf. Inf. Theory, 1974.
-
(1974)
Proc. 7th Prague Conf. Inf. Theory
-
-
Ahlswede, R.1
Körner, J.2
-
2
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
D. Beaver, "Correlated pseudorandomness and the complexity of private computations," in Proc. 28th STOC, 1996, pp. 479-488.
-
(1996)
Proc. 28th STOC
, pp. 479-488
-
-
Beaver, D.1
-
3
-
-
84928743703
-
Precomputing oblivious transfer
-
D. Coppersmith, Ed. New York, NY, USA: Springer- Verlag
-
D. Beaver, "Precomputing oblivious transfer," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 963, D. Coppersmith, Ed. New York, NY, USA: Springer-Verlag, 1995, pp. 97-109.
-
(1995)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
5
-
-
45249098450
-
On oblivious transfer capacity
-
I. Csiszár and R. Ahlswede, "On oblivious transfer capacity," in Proc. ISIT, 2007, pp. 2061-2064.
-
(2007)
Proc. ISIT
, pp. 2061-2064
-
-
Csiszár, I.1
Ahlswede, R.2
-
7
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
J. Stern, Ed. New York, NY, USA: Springer- Verlag
-
Y. Dodis and S. Micali, "Lower bounds for oblivious transfer reductions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 1592, J. Stern, Ed. New York, NY, USA: Springer-Verlag, 1999, pp. 42-55.
-
(1999)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
9
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gács and J. Körner, "Common information is far less than mutual information," Problems Control Inf. Theory, vol. 2, no. 2, pp. 119-162, 1973.
-
(1973)
Problems Control Inf. Theory
, vol.2
, Issue.2
, pp. 119-162
-
-
Gács, P.1
Körner, J.2
-
10
-
-
0038025242
-
To code or not to code: Lossy source-channel communication revisited
-
May
-
M. Gastpar, B. Rimoldi, and M. Vetterli, "To code or not to code: Lossy source-channel communication revisited," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1147-1158, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1147-1158
-
-
Gastpar, M.1
Rimoldi, B.2
Vetterli, M.3
-
11
-
-
0016130289
-
Source coding for a simple network
-
R. M. Gray and A. D. Wyner, "Source coding for a simple network," Bell Syst. Tech. J., vol. 53, no. 9, pp. 1681-1721, 1974.
-
(1974)
Bell Syst. Tech. J.
, vol.53
, Issue.9
, pp. 1681-1721
-
-
Gray, R.M.1
Wyner, A.D.2
-
12
-
-
39049108276
-
On the oblivious transfer capacity of the erasure channel
-
DOI 10.1109/ISIT.2006.262082, 4036202, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
H. Imai, K. Morozov, and A. C. A. Nascimento, "On the oblivious transfer capacity of the erasure channel," in Proc. IEEE ISIT, Jul. 2006, pp. 1428-1431. (Pubitemid 351244333)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 1428-1431
-
-
Imai, H.1
Morozov, K.2
Nascimento, A.C.A.3
-
13
-
-
85006554326
-
Efficient oblivious transfer protocols achieving a non-zero rate from any non-trivial noisy correlation
-
H. Imai, K. Morozov, and A. C. A. Nascimento, "Efficient oblivious transfer protocols achieving a non-zero rate from any non-trivial noisy correlation," in Proc. 2nd ICITS, 2007, pp. 183-194.
-
(2007)
Proc. 2nd ICITS
, pp. 183-194
-
-
Imai, H.1
Morozov, K.2
Nascimento, A.C.A.3
-
14
-
-
39049122173
-
Efficient protocols achieving the commitment capacity of noisy correlations
-
DOI 10.1109/ISIT.2006.262083, 4036203, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
H. Imai, K. Morozov, A. C. A. Nascimento, and A. Winter, "Efficient protocols achieving the commitment capacity of noisy correlations," in Proc. IEEE ISIT, Jul. 2006, pp. 1432-1436. (Pubitemid 351244334)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 1432-1436
-
-
Imai, H.1
Morozov, K.2
Nascimento, A.C.A.3
Winter, A.4
-
15
-
-
5044248797
-
Rates for bit commitment and coin tossing from noisy correlation
-
H. Imai, J. Müller-Quade, A. C. A. Nascimento, and A. Winter, "Rates for bit commitment and coin tossing from noisy correlation," in Proc. ISIT, 2004, p. 45.
-
(2004)
Proc. ISIT
, pp. 45
-
-
Imai, H.1
Müller-Quade, J.2
Nascimento, A.C.A.3
Winter, A.4
-
16
-
-
77952379198
-
Extracting correlations
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Extracting correlations," in Proc. 50th FOCS, 2009, pp. 261-270.
-
(2009)
Proc. 50th Focs
, pp. 261-270
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
17
-
-
79952428986
-
A new dual to the gács-körner common information defined via the gray-wyner system
-
S. Kamath and V. Anantharam, "A new dual to the Gács- Körner common information defined via the Gray-Wyner system," in Proc. 48th Allerton Conf. Commun., Control, Comput., 2010, pp. 1340-1346.
-
(2010)
Proc. 48th Allerton Conf. Commun., Control, Comput.
, pp. 1340-1346
-
-
Kamath, S.1
Anantharam, V.2
-
18
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian, "Founding cryptography on oblivious transfer," in Proc. 20th STOC, 1988, pp. 20-31.
-
(1988)
Proc. 20th STOC
, pp. 20-31
-
-
Kilian, J.1
-
19
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
J. Kilian, "More general completeness theorems for secure two-party computation," in Proc. 32nd STOC, 2000, pp. 316-324.
-
(2000)
Proc. 32nd STOC
, pp. 316-324
-
-
Kilian, J.1
-
20
-
-
67650142475
-
On lossless coding with coded side information
-
Jul.
-
D. Marco and M. Effros, "On lossless coding with coded side information," IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3284-3296, Jul. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.7
, pp. 3284-3296
-
-
Marco, D.1
Effros, M.2
-
22
-
-
80054795248
-
Assisted common information: Further results
-
V. M. Prabhakaran and M. M. Prabhakaran, "Assisted common information: Further results," in Proc. ISIT, 2011, pp. 2861-2865.
-
(2011)
Proc. ISIT
, pp. 2861-2865
-
-
Prabhakaran, V.M.1
Prabhakaran, M.M.2
-
23
-
-
84873186031
-
On secure multiparty sampling for more than two parties
-
Sep.
-
M. M. Prabhakaran and V. M. Prabhakaran, "On secure multiparty sampling for more than two parties," in Proc. IEEE ITW, Sep. 2012, pp. 99-103.
-
(2012)
Proc. IEEE ITW
, pp. 99-103
-
-
Prabhakaran, M.M.1
Prabhakaran, V.M.2
-
24
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Harvard Univ., Cambridge, MA, USA, Tech. Rep. TR-81
-
M. Rabin, "How to exchange secrets by oblivious transfer," Harvard Aiken Comput. Lab., Harvard Univ., Cambridge, MA, USA, Tech. Rep. TR-81, 1981.
-
(1981)
Harvard Aiken Comput. Lab
-
-
Rabin, M.1
-
25
-
-
0001998264
-
Conjugate coding
-
S. Wiesner, "Conjugate coding," Sigact News, vol. 15, no. 1, pp. 78-88, 1983.
-
(1983)
Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
26
-
-
77956992510
-
On the efficiency of classical and quantum oblivious transfer reductions
-
T. Rabin, Ed. New York, NY, USA: Springer- Verlag
-
S. Winkler and J. Wullschleger, "On the efficiency of classical and quantum oblivious transfer reductions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6223, T. Rabin, Ed. New York, NY, USA: Springer-Verlag, 2010, pp. 707-723.
-
(2010)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6223
, pp. 707-723
-
-
Winkler, S.1
Wullschleger, J.2
-
27
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
K. G. Paterson, Ed. New York, NY, USA, Springer- Verlag
-
A. Winter, A. C. A. Nascimento, and H. Imai, "Commitment capacity of discrete memoryless channels," in Cryptography and Coding (Lecture Notes in Computer Science), vol. 2898, K. G. Paterson, Ed. New York, NY, USA, Springer-Verlag, 2003, pp. 35-51.
-
(2003)
Cryptography and Coding (Lecture Notes in Computer Science)
, vol.2898
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
28
-
-
0016442512
-
On sequences of pairs of dependent random variables
-
H. S. Witsenhausen, "On sequences of pairs of dependent random variables," SIAM J. Appl. Math., vol. 28, no. 1, pp. 100-113, 1975.
-
(1975)
SIAM J. Appl. Math.
, vol.28
, Issue.1
, pp. 100-113
-
-
Witsenhausen, H.S.1
-
29
-
-
33746074792
-
Oblivious transfer is symmetric
-
DOI 10.1007/11761679-14, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings LNCS
-
S. Wolf and J. Wullschleger, "Oblivious transfer is symmetric," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 4004, S. Vaudenay, Ed. New York, NY, USA: Springer-Verlag, 2006, pp. 222-232. (Pubitemid 44072242)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 222-232
-
-
Wolf, S.1
Wullschleger, J.2
-
30
-
-
45249110618
-
New monotones and lower bounds in unconditional two-party computation
-
Jun.
-
S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2792-2797, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2792-2797
-
-
Wolf, S.1
Wullschleger, J.2
-
31
-
-
38049114615
-
Oblivious-transfer amplification
-
Swiss Federal Inst. Technol., Zürich, Switzerland
-
J. Wullschleger, "Oblivious-transfer amplification," Ph.D. dissertation, Dept. Comput. Sci., Swiss Federal Inst. Technol., Zürich, Switzerland, 2008.
-
(2008)
Ph.D. Dissertation Dept. Comput. Sci
-
-
Wullschleger, J.1
-
32
-
-
0016485894
-
The common information of two dependent random variables
-
Mar.
-
A. D. Wyner, "The common information of two dependent random variables," IEEE Trans. Inf. Theory, vol. 21, no. 2, pp. 163-179, Mar. 1975.
-
(1975)
IEEE Trans. Inf. Theory
, vol.21
, Issue.2
, pp. 163-179
-
-
Wyner, A.D.1
-
33
-
-
0016882596
-
Rate-distortion function for source coding with side information at the decoder
-
Jan.
-
A. D. Wyner and J. Ziv, "Rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inf. Theory, vol. 22, no. 1, pp. 1-11, Jan. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.1
, pp. 1-11
-
-
Wyner, A.D.1
Ziv, J.2
-
34
-
-
0028346503
-
Coding theorems for Shannon?s cipher system with correlated source outputs, and common information
-
Jan.
-
H. Yamamoto, "Coding theorems for Shannon?s cipher system with correlated source outputs, and common information," IEEE Trans. Inf. Theory, vol. 40, no. 1, pp. 85-95, Jan. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.1
, pp. 85-95
-
-
Yamamoto, H.1
|