메뉴 건너뛰기




Volumn 60, Issue 10, 2014, Pages 6389-6398

The capacity region of the source-type model for secret key and private key generation

Author keywords

[No Author keywords available]

Indexed keywords

CAPACITY REGIONS; PRIVATE KEY; SECRET KEY;

EID: 84906543932     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2014.2340400     Document Type: Article
Times cited : (25)

References (16)
  • 1
    • 33749438006 scopus 로고    scopus 로고
    • The secret key private key capacity region for three terminals
    • Adelaide, Australia, Sep.
    • C. Ye and P. Narayan, "The secret key private key capacity region for three terminals, " in Proc. Int. Symp. Inf. Theory (ISIT), Adelaide, Australia, Sep. 2005, pp. 2142-2146.
    • (2005) Proc. Int. Symp. Inf. Theory (ISIT) , pp. 2142-2146
    • Ye, C.1    Narayan, P.2
  • 2
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. I. Secret sharing, " IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 3
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 4
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • Jul.
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources, " IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471-480, Jul. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 5
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszar and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszar, I.1    Narayan, P.2
  • 6
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar.
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information, " IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 7
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar.
    • I. Csiszar and P. Narayan, "Common randomness and secret key generation with a helper, " IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 8
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result, " IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 9
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part II the simulatability condition
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition, " IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 10
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels. II. Privacy amplification
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels. II. Privacy amplification, " IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 11
    • 84856830966 scopus 로고    scopus 로고
    • Secret key and private key constructions for simple multiterminal source models
    • Feb.
    • C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models, " IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 639-651, Feb. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.2 , pp. 639-651
    • Ye, C.1    Narayan, P.2
  • 12
    • 84890400997 scopus 로고    scopus 로고
    • Simultaneously generating multiple keys in many to one networks
    • Istanbul, Turkey, Jul.
    • L. Lai and L. Huie, "Simultaneously generating multiple keys in many to one networks, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Istanbul, Turkey, Jul. 2013, pp. 2394-2398.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 2394-2398
    • Lai, L.1    Huie, L.2
  • 13
    • 84873116301 scopus 로고    scopus 로고
    • Simultaneously generating multiple keys and multi-commodity flow in networks
    • Lausanne, Switzerland, Sep.
    • L. Lai and S.-W. Ho, "Simultaneously generating multiple keys and multi-commodity flow in networks, " in Proc. IEEE Inf. Theory Workshop (ITW), Lausanne, Switzerland, Sep. 2012, pp. 627-631.
    • (2012) Proc. IEEE Inf. Theory Workshop (ITW) , pp. 627-631
    • Lai, L.1    Ho, S.-W.2
  • 14
    • 77955669285 scopus 로고    scopus 로고
    • Information theoretic generation of multiple secret keys
    • Univ. Maryland, College Park, MD, USA
    • C. Ye, "Information theoretic generation of multiple secret keys, " Ph. D. dissertation, Dept. Elect. Eng., Univ. Maryland, College Park, MD, USA, 2005.
    • (2005) Ph. D. Dissertation, Dept. Elect. Eng.
    • Ye, C.1
  • 15
    • 0034450066 scopus 로고    scopus 로고
    • From weak to strong information-theoretic key agreement
    • Sorrento, Italy, Jun.
    • U. M. Maurer and S. Wolf, "From weak to strong information-theoretic key agreement, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Sorrento, Italy, Jun. 2000, p. 18.
    • (2000) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 18
    • Maurer, U.M.1    Wolf, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.