메뉴 건너뛰기




Volumn 61, Issue 9, 2015, Pages 4809-4827

Converses for Secret Key Agreement and Secure Computing

Author keywords

Hypothesis testing; secret key agreement; secure two party computation; single shot converse

Indexed keywords

INFORMATION THEORY;

EID: 84939864518     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2015.2457926     Document Type: Article
Times cited : (77)

References (83)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. Secret sharing, " IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 3
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Berlin, Germany: Springer-Verlag
    • D. Beaver, "Precomputing oblivious transfer, " in Advances in Cryptol-ogy. Berlin, Germany: Springer-Verlag, 1995, pp. 97-109.
    • (1995) Advances in Cryptol-ogy , pp. 97-109
    • Beaver, D.1
  • 6
    • 4243216277 scopus 로고    scopus 로고
    • Mixed-state entanglement and quantum error correction
    • Nov.
    • C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. Wootters, "Mixed-state entanglement and quantum error correction, " Phys. Rev. A, vol. 54, pp. 3824-3851, Nov. 1996.
    • (1996) Phys. Rev. A , vol.54 , pp. 3824-3851
    • Bennett, C.H.1    DiVincenzo, D.P.2    Smolin, J.A.3    Wootters, W.K.4
  • 7
    • 17744380057 scopus 로고
    • Coin flipping by telephone a protocol for solving impossible problems
    • Jan.
    • M. Blum, "Coin flipping by telephone a protocol for solving impossible problems, " SIGACT News, vol. 15, no. 1, pp. 23-27, Jan. 1983.
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 23-27
    • Blum, M.1
  • 8
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Oct.
    • R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols, " in Proc. 42nd Symp. Found. Comput. Sci., Oct. 2001, pp. 136-145.
    • (2001) Proc. 42nd Symp. Found. Comput. Sci , pp. 136-145
    • Canetti, R.1
  • 9
    • 0036818574 scopus 로고    scopus 로고
    • Multipartite classical and quantum secrecy monotones
    • Oct.
    • N. J. Cerf, S. Massar, and S. Schneider, "Multipartite classical and quantum secrecy monotones, " Phys. Rev. A, vol. 66, no. 4, p. 042309, Oct. 2002.
    • (2002) Phys. Rev. A , vol.66 , Issue.4 , pp. 042309
    • Cerf, N.J.1    Massar, S.2    Schneider, S.3
  • 12
    • 85012928152 scopus 로고
    • Weakening security assumptions and oblivious transfer
    • Berlin, Germany: Springer-Verlag
    • C. Crépeau and J. Kilian, "Weakening security assumptions and oblivious transfer, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1990, pp. 2-7.
    • (1990) Advances in Cryptology , pp. 2-7
    • Crépeau, C.1    Kilian, J.2
  • 13
    • 0010074899 scopus 로고    scopus 로고
    • Efficient cryptographic protocols based on noisy channels
    • Berlin, Germany: Springer-Verlag
    • C. Crépeau, "Efficient cryptographic protocols based on noisy channels, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1997, pp. 306-317.
    • (1997) Advances in Cryptology , pp. 306-317
    • Crépeau, C.1
  • 14
    • 0029706655 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár, "Almost independence and secrecy capacity, " Problemy Peredachi Inf., vol. 32, no. 1, pp. 48-57, 1996.
    • (1996) Problemy Peredachi Inf. , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1
  • 16
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 17
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • Jun.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 18
    • 66949151794 scopus 로고    scopus 로고
    • Min-and max-relative entropies and a new entanglement monotone
    • Jun.
    • N. Datta, "Min-and max-relative entropies and a new entanglement monotone, " IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2816-2826, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2816-2826
    • Datta, N.1
  • 19
    • 17144413068 scopus 로고    scopus 로고
    • Distillation of secret key and entanglement from quantum states
    • Jan.
    • I. Devetak and A. Winter, "Distillation of secret key and entanglement from quantum states, " Proc. Roy. Soc. London A, vol. 461, no. 2053, pp. 207-235, Jan. 2005.
    • (2005) Proc. Roy. Soc. London A , vol.461 , Issue.2053 , pp. 207-235
    • Devetak, I.1    Winter, A.2
  • 20
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, " SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 21
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Jun.
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts, " Commun. ACM, vol. 28, no. 6, pp. 637-647, Jun. 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 23
    • 35048830930 scopus 로고    scopus 로고
    • Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
    • Berlin, Germany: Springer-Verlag
    • M. Fitzi, S. Wolf, and J. Wullschleger, "Pseudo-signatures, broadcast, and multi-party computation from correlated randomness, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 562-578.
    • (2004) Advances in Cryptology , pp. 562-578
    • Fitzi, M.1    Wolf, S.2    Wullschleger, J.3
  • 24
    • 0006932810 scopus 로고
    • Common information is far less than mutual information
    • P. Gács and J. Körner, "Common information is far less than mutual information, " Problems Control Inf. Theory, vol. 2, no. 2, pp. 149-162, 1973.
    • (1973) Problems Control Inf. Theory , vol.2 , Issue.2 , pp. 149-162
    • Gács, P.1    Körner, J.2
  • 26
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals-Part i
    • Aug.
    • A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I, " IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.A.1    Anantharam, V.2
  • 28
    • 0038444459 scopus 로고    scopus 로고
    • General formulas for capacity of classical-quantum channels
    • Jul.
    • M. Hayashi and H. Nagaoka, "General formulas for capacity of classical-quantum channels, " IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1753-1768, Jul. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.7 , pp. 1753-1768
    • Hayashi, M.1    Nagaoka, H.2
  • 32
    • 36448960568 scopus 로고    scopus 로고
    • Robustness of quantum Markov chains
    • B. Ibinson, N. Linden, and A. Winter, "Robustness of quantum Markov chains, " Commun. Math. Phys., vol. 277, no. 2, pp. 289-304, 2008.
    • (2008) Commun. Math. Phys. , vol.277 , Issue.2 , pp. 289-304
    • Ibinson, B.1    Linden, N.2    Winter, A.3
  • 36
    • 84958540075 scopus 로고    scopus 로고
    • Information theoretic security for encryption based on conditional Rényi entropies
    • New York, NY, USA: Springer-Verlag
    • M. Iwamoto and J. Shikata, "Information theoretic security for encryption based on conditional Rényi entropies, " in Information Theoretic Security. New York, NY, USA: Springer-Verlag, 2014, pp. 103-121.
    • (2014) Information Theoretic Security , pp. 103-121
    • Iwamoto, M.1    Shikata, J.2
  • 40
    • 0033706604 scopus 로고    scopus 로고
    • More general completeness theorems for secure two-party computation
    • J. Kilian, "More general completeness theorems for secure two-party computation, " in Proc. 32nd Annu. Symp. Theory Comput. (STOC), 2000, pp. 316-324.
    • (2000) Proc. 32nd Annu. Symp. Theory Comput. (STOC) , pp. 316-324
    • Kilian, J.1
  • 41
    • 69449101829 scopus 로고    scopus 로고
    • The operational meaning of min-and max-entropy
    • Sep.
    • R. König, R. Renner, and C. Schaffner, "The operational meaning of min-and max-entropy, " IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4337-4347, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4337-4347
    • König, R.1    Renner, R.2    Schaffner, C.3
  • 42
    • 84857779174 scopus 로고    scopus 로고
    • Unconditional security from noisy quantum storage
    • Mar.
    • R. König, S. Wehner, and J. Wullschleger, "Unconditional security from noisy quantum storage, " IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1962-1984, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1962-1984
    • König, R.1    Wehner, S.2    Wullschleger, J.3
  • 44
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 45
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • Jul.
    • U. M. Maurer, "Authentication theory and hypothesis testing, " IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, Jul. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 46
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar.
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information, " IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 48
    • 45249089615 scopus 로고    scopus 로고
    • On the oblivious-transfer capacity of noisy resources
    • Jun.
    • A. C. A. Nascimento and A. Winter, "On the oblivious-transfer capacity of noisy resources, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2572-2581, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2572-2581
    • Nascimento, A.C.A.1    Winter, A.2
  • 49
    • 0034316025 scopus 로고    scopus 로고
    • Strong converse and Stein's lemma in quantum hypothesis testing
    • Nov.
    • T. Ogawa and H. Nagaoka, "Strong converse and Stein's lemma in quantum hypothesis testing, " IEEE Trans. Inf. Theory, vol. 46, no. 7, pp. 2428-2433, Nov. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.7 , pp. 2428-2433
    • Ogawa, T.1    Nagaoka, H.2
  • 51
    • 3242749566 scopus 로고    scopus 로고
    • Ph.D. dissertation, Media Lab., Massachusetts Inst. Technol., Cambridge, MA, USA
    • R. S. Pappu, "Physical one-way functions, " Ph.D. dissertation, Media Lab., Massachusetts Inst. Technol., Cambridge, MA, USA, 2001.
    • (2001) Physical One-way Functions
    • Pappu, R.S.1
  • 52
    • 77951624674 scopus 로고    scopus 로고
    • Channel coding rate in the finite blocklength regime
    • May
    • Y. Polyanskiy, H. V. Poor, and S. Verdú, "Channel coding rate in the finite blocklength regime, " IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.5 , pp. 2307-2359
    • Polyanskiy, Y.1    Poor, H.V.2    Verdú, S.3
  • 54
    • 84901268112 scopus 로고    scopus 로고
    • Assisted common information with an application to secure two-party sampling
    • Jun.
    • V. M. Prabhakaran and M. M. Prabhakaran, "Assisted common information with an application to secure two-party sampling, " IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3413-3434, Jun. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.6 , pp. 3413-3434
    • Prabhakaran, V.M.1    Prabhakaran, M.M.2
  • 55
    • 77953754678 scopus 로고    scopus 로고
    • Aiken Comput. Lab. Harvard Univ., Tech. Rep. TR81. [Online]
    • M. O. Rabin. (2005). "How to exchange secrets with oblivious transfer, " Aiken Comput. Lab. Harvard Univ., Tech. Rep. TR81. [Online]. Available: http://eprint.iacr.org/
    • (2005) How to Exchange Secrets with Oblivious Transfer
    • Rabin, M.O.1
  • 57
    • 84929305384 scopus 로고    scopus 로고
    • A new upperbound for the oblivious transfer capacity of discrete memoryless channels
    • K. S. Rao and V. M. Prabhakaran, "A new upperbound for the oblivious transfer capacity of discrete memoryless channels, " in Proc. IEEE Inf. Theory Workshop, Nov. 2014, pp. 35-39.
    • (2014) Proc. IEEE Inf. Theory Workshop, Nov. , pp. 35-39
    • Rao, K.S.1    Prabhakaran, V.M.2
  • 58
    • 33846181385 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. Comput. Sci., ETH Zürich, Zürich, Switzerland
    • R. Renner, "Security of quantum key distribution, " Ph.D. dissertation, Dept. Comput. Sci., ETH Zürich, Zürich, Switzerland, 2005.
    • (2005) Security of Quantum Key Distribution
    • Renner, R.1
  • 59
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret-key agreement: The gap between formation and secrecy extraction
    • R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction, " in Proc. EUROCRYPT, 2003, pp. 562-577.
    • (2003) Proc. EUROCRYPT , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 60
    • 33646767482 scopus 로고    scopus 로고
    • Simple and tight bounds for information reconciliation and privacy amplification
    • R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification, " in Proc. ASIACRYPT, 2005, pp. 199-216.
    • (2005) Proc. ASIACRYPT , pp. 199-216
    • Renner, R.1    Wolf, S.2
  • 62
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems, " Bell Syst. Te ch. J., vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 64
    • 84886705884 scopus 로고    scopus 로고
    • A tight upper bound for the third-order asymptotics for most discrete memoryless channels
    • Nov.
    • M. Tomamichel and V. Y. F. Tan, "A tight upper bound for the third-order asymptotics for most discrete memoryless channels, " IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7041-7051, Nov. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.11 , pp. 7041-7051
    • Tomamichel, M.1    Tan, V.Y.F.2
  • 65
    • 0242291643 scopus 로고
    • An information theoretical identity and a problem involving capacity
    • F. Topsøe, "An information theoretical identity and a problem involving capacity, " Stud. Sci. Math. Hungary, vol. 2, pp. 291-292, 1967.
    • (1967) Stud. Sci. Math. Hungary , vol.2 , pp. 291-292
    • Topsøe, F.1
  • 67
    • 84882989241 scopus 로고    scopus 로고
    • Common information and secret key capacity
    • Sep.
    • H. Tyagi, "Common information and secret key capacity, " IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5627-5640, Sep. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.9 , pp. 5627-5640
    • Tyagi, H.1
  • 68
    • 84882971734 scopus 로고    scopus 로고
    • How many queries will resolve common randomness?
    • Sep.
    • H. Tyagi and P. Narayan, "How many queries will resolve common randomness?" IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5363-5378, Sep. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.9 , pp. 5363-5378
    • Tyagi, H.1    Narayan, P.2
  • 69
    • 80053961199 scopus 로고    scopus 로고
    • When is a function securely computable?
    • Oct.
    • H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6337-6350, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6337-6350
    • Tyagi, H.1    Narayan, P.2    Gupta, P.3
  • 73
    • 84901684455 scopus 로고    scopus 로고
    • A bound for multiparty secret key agreement and implications for a problem of secure computing
    • H. Tyagi and S. Watanabe, "A bound for multiparty secret key agreement and implications for a problem of secure computing, " in Proc. EUROCRYPT, 2014, pp. 369-386.
    • (2014) Proc. EUROCRYPT , pp. 369-386
    • Tyagi, H.1    Watanabe, S.2
  • 74
    • 0032025985 scopus 로고    scopus 로고
    • Entanglement measures and purification procedures
    • Mar.
    • V. Vedral and M. B. Plenio, "Entanglement measures and purification procedures, " Phys. Rev. A, vol. 57, pp. 1619-1633, Mar. 1998.
    • (1998) Phys. Rev. A , vol.57 , pp. 1619-1633
    • Vedral, V.1    Plenio, M.B.2
  • 75
    • 84861651671 scopus 로고    scopus 로고
    • One-shot classical-quantum capacity and hypothesis testing
    • May
    • L. Wang and R. Renner, "One-shot classical-quantum capacity and hypothesis testing, " Phys. Rev. Lett., vol. 108, no. 20, p. 200501, May 2012.
    • (2012) Phys. Rev. Lett. , vol.108 , Issue.20 , pp. 200501
    • Wang, L.1    Renner, R.2
  • 76
    • 84886667603 scopus 로고    scopus 로고
    • Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy
    • S. Watanabe and M. Hayashi, "Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy, " in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2013, pp. 2715-2719.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory, Jul. , pp. 2715-2719
    • Watanabe, S.1    Hayashi, M.2
  • 78
    • 77953162623 scopus 로고    scopus 로고
    • Implementation of two-party protocols in the noisy-storage model
    • May
    • S. Wehner, M. Curty, C. Schaffner, and H.-K. Lo, "Implementation of two-party protocols in the noisy-storage model, " Phys. Rev. A, vol. 81, no. 5, p. 052336, May 2010.
    • (2010) Phys. Rev. A , vol.81 , Issue.5 , pp. 052336
    • Wehner, S.1    Curty, M.2    Schaffner, C.3    Lo, H.-K.4
  • 79
    • 84901321090 scopus 로고    scopus 로고
    • On the efficiency of classical and quantum secure function evaluation
    • Jun.
    • S. Winkler and J. Wullschleger, "On the efficiency of classical and quantum secure function evaluation, " IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3123-3143, Jun. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.6 , pp. 3123-3143
    • Winkler, S.1    Wullschleger, J.2
  • 81
    • 33746074792 scopus 로고    scopus 로고
    • Oblivious transfer is symmetric
    • S. Wolf and J. Wullschleger, "Oblivious transfer is symmetric, " in Proc. EUROCRYPT, 2006, pp. 222-232.
    • (2006) Proc. EUROCRYPT , pp. 222-232
    • Wolf, S.1    Wullschleger, J.2
  • 82
    • 45249110618 scopus 로고    scopus 로고
    • New monotones and lower bounds in unconditional two-party computation
    • Jun.
    • S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2792-2797, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2792-2797
    • Wolf, S.1    Wullschleger, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.