메뉴 건너뛰기




Volumn 8441 LNCS, Issue , 2014, Pages 369-386

A bound for multiparty secret key agreement and implications for a problem of secure computing

Author keywords

secret key agreement; secure computing; single shot bound

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CRYPTOGRAPHY;

EID: 84901684455     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-55220-5_21     Document Type: Conference Paper
Times cited : (43)

References (37)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-part i: Secret sharing
    • Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryptography-part i: Secret sharing. IEEE Trans. Inf. Theory 39(4), 1121-1132 (1993)
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210-229 (1988)
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.M.3
  • 5
    • 84957375876 scopus 로고    scopus 로고
    • Smooth entropy and Rényi entropy
    • Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
    • Cachin, C.: Smooth entropy and Rényi entropy. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 193-208. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 193-208
    • Cachin, C.1
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • also, see Cryptology ePrint Archive, Report 2000/067
    • Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. Proc. Annual Symposium on Foundations of Computer Science (also, see Cryptology ePrint Archive, Report 2000/067), 136-145 (2001)
    • (2001) Proc. Annual Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 7
    • 0036818574 scopus 로고    scopus 로고
    • Multipartite classical and quantum secrecy monotones
    • Cerf, N., Massar, S., Schneider, S.: Multipartite classical and quantum secrecy monotones. Physical Review A 66(4), 042309 (2002)
    • (2002) Physical Review A , vol.66 , Issue.4 , pp. 042309
    • Cerf, N.1    Massar, S.2    Schneider, S.3
  • 11
    • 0029706655 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • Csiszár, I.: Almost independence and secrecy capacity. Prob. Pered. Inform. 32(1), 48-57 (1996)
    • (1996) Prob. Pered. Inform. , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1
  • 13
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Csiszár, I., Narayan, P.: Secrecy capacities for multiple terminals. IEEE Trans. Inf. Theory 50(12), 3047-3061 (2004)
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 14
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38(1), 97-139 (2008)
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 15
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals part i
    • Gohari, A.A., Anantharam, V.: Information-theoretic key agreement of multiple terminals part i. IEEE Trans. Inf. Theory 56(8), 3973-3996 (2010)
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.A.1    Anantharam, V.2
  • 16
    • 0038444459 scopus 로고    scopus 로고
    • General formulas for capacity of classical-quantum channels
    • Hayashi, M., Nagaoka, H.: General formulas for capacity of classical-quantum channels. IEEE Trans. Inf. Theory 49(7), 1753-1768 (2003)
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.7 , pp. 1753-1768
    • Hayashi, M.1    Nagaoka, H.2
  • 20
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733-742 (1993)
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 21
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Maurer, U.M., Wolf, S.: Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans. Inf. Theory 45(2), 499-514 (1999)
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 22
    • 0013317517 scopus 로고
    • Communication with secrecy constraints
    • Orlitsky, A., Gamal, A.E.: Communication with secrecy constraints. In: STOC, pp. 217-224 (1984)
    • (1984) STOC , pp. 217-224
    • Orlitsky, A.1    Gamal, A.E.2
  • 23
    • 3242749566 scopus 로고    scopus 로고
    • Ph. D. Dissertation, Massachussetts Institute of Technology
    • Pappu, R.S.: Physical one-way functions. Ph. D. Dissertation, Massachussetts Institute of Technology (2001)
    • (2001) Physical One-way Functions
    • Pappu, R.S.1
  • 24
    • 77951624674 scopus 로고    scopus 로고
    • Channel coding rate in the finite blocklength regime
    • Polyanskiy, Y., Poor, H.V., Verdú, S.: Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 56(5), 2307-2359 (2010)
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.5 , pp. 2307-2359
    • Polyanskiy, Y.1    Poor, H.V.2    Verdú, S.3
  • 26
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Renner, R., Wolf, S.: New bounds in secret-key agreement: The gap between formation and secrecy extraction. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 562-577. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 28
    • 70549105910 scopus 로고    scopus 로고
    • Trade-offs in information-theoretic multiparty one-way key agreement
    • Desmedt, Y. (ed.) ICITS 2007. Springer, Heidelberg
    • Renner, R., Wolf, S., Wullschleger, J.: Trade-offs in information-theoretic multiparty one-way key agreement. In: Desmedt, Y. (ed.) ICITS 2007. LNCS, vol. 4883, pp. 65-75. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.4883 , pp. 65-75
    • Renner, R.1    Wolf, S.2    Wullschleger, J.3
  • 30
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715 (1949)
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 31
  • 32
    • 84882971734 scopus 로고    scopus 로고
    • How many queries will resolve common randomness?
    • Tyagi, H., Narayan, P.: How many queries will resolve common randomness? IEEE Trans. Inf. Theory 59(9), 5363-5378 (2013)
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.9 , pp. 5363-5378
    • Tyagi, H.1    Narayan, P.2
  • 33
    • 80053961199 scopus 로고    scopus 로고
    • When is a function securely computable?
    • Tyagi, H., Narayan, P., Gupta, P.: When is a function securely computable? IEEE Trans. Inf. Theory 57(10), 6337-6350 (2011)
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6337-6350
    • Tyagi, H.1    Narayan, P.2    Gupta, P.3
  • 34
    • 0032025985 scopus 로고    scopus 로고
    • Entanglement measures and purification procedures
    • Vedral, V., Plenio, M.B.: Entanglement measures and purification procedures. Phys. Rev. A 57, 1619-1633 (1998)
    • (1998) Phys. Rev. A , vol.57 , pp. 1619-1633
    • Vedral, V.1    Plenio, M.B.2
  • 35
    • 84861651671 scopus 로고    scopus 로고
    • One-shot classical-quantum capacity and hypothesis testing
    • Wang, L., Renner, R.: One-shot classical-quantum capacity and hypothesis testing. Phys. Rev. Lett. 108(20), 200501 (2012)
    • (2012) Phys. Rev. Lett. , vol.108 , Issue.20 , pp. 200501
    • Wang, L.1    Renner, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.