-
1
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. Secret sharing, " IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
84875984557
-
On oblivious transfer capacity
-
Berlin, Germany: Springer-Verlag
-
R. Ahlswede and I. Csiszár, "On oblivious transfer capacity, " in Information Theory, Combinatorics, and Search Theory. Berlin, Germany: Springer-Verlag, 2013, pp. 145-166.
-
(2013)
Information Theory, Combinatorics, and Search Theory
, pp. 145-166
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
84928743703
-
Precomputing oblivious transfer
-
Berlin, Germany: Springer-Verlag
-
D. Beaver, "Precomputing oblivious transfer, " in Advances in Cryptol-ogy. Berlin, Germany: Springer-Verlag, 1995, pp. 97-109.
-
(1995)
Advances in Cryptol-ogy
, pp. 97-109
-
-
Beaver, D.1
-
4
-
-
84958544842
-
On the cryptographic complexity of the worst functions
-
A. Beimel, Y. Ishai, R. Kumaresan, and E. Kushilevitz, "On the cryptographic complexity of the worst functions, " in Proc. 11th TCC, 2014, pp. 317-342.
-
(2014)
Proc. 11th TCC
, pp. 317-342
-
-
Beimel, A.1
Ishai, Y.2
Kumaresan, R.3
Kushilevitz, E.4
-
5
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification, " IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
6
-
-
4243216277
-
Mixed-state entanglement and quantum error correction
-
Nov.
-
C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. Wootters, "Mixed-state entanglement and quantum error correction, " Phys. Rev. A, vol. 54, pp. 3824-3851, Nov. 1996.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 3824-3851
-
-
Bennett, C.H.1
DiVincenzo, D.P.2
Smolin, J.A.3
Wootters, W.K.4
-
7
-
-
17744380057
-
Coin flipping by telephone a protocol for solving impossible problems
-
Jan.
-
M. Blum, "Coin flipping by telephone a protocol for solving impossible problems, " SIGACT News, vol. 15, no. 1, pp. 23-27, Jan. 1983.
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 23-27
-
-
Blum, M.1
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Oct.
-
R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols, " in Proc. 42nd Symp. Found. Comput. Sci., Oct. 2001, pp. 136-145.
-
(2001)
Proc. 42nd Symp. Found. Comput. Sci
, pp. 136-145
-
-
Canetti, R.1
-
9
-
-
0036818574
-
Multipartite classical and quantum secrecy monotones
-
Oct.
-
N. J. Cerf, S. Massar, and S. Schneider, "Multipartite classical and quantum secrecy monotones, " Phys. Rev. A, vol. 66, no. 4, p. 042309, Oct. 2002.
-
(2002)
Phys. Rev. A
, vol.66
, Issue.4
, pp. 042309
-
-
Cerf, N.J.1
Massar, S.2
Schneider, S.3
-
11
-
-
38049009328
-
Unifying classical and quantum key distillation
-
M. Christandl, A. Ekert, M. Horodecki, P. Horodecki, J. Oppenheim, and R. Renner, "Unifying classical and quantum key distillation, " in Proc. TCC, 2007, pp. 456-478.
-
(2007)
Proc. TCC
, pp. 456-478
-
-
Christandl, M.1
Ekert, A.2
Horodecki, M.3
Horodecki, P.4
Oppenheim, J.5
Renner, R.6
-
12
-
-
85012928152
-
Weakening security assumptions and oblivious transfer
-
Berlin, Germany: Springer-Verlag
-
C. Crépeau and J. Kilian, "Weakening security assumptions and oblivious transfer, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1990, pp. 2-7.
-
(1990)
Advances in Cryptology
, pp. 2-7
-
-
Crépeau, C.1
Kilian, J.2
-
13
-
-
0010074899
-
Efficient cryptographic protocols based on noisy channels
-
Berlin, Germany: Springer-Verlag
-
C. Crépeau, "Efficient cryptographic protocols based on noisy channels, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1997, pp. 306-317.
-
(1997)
Advances in Cryptology
, pp. 306-317
-
-
Crépeau, C.1
-
14
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity, " Problemy Peredachi Inf., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Problemy Peredachi Inf.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
16
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
17
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
18
-
-
66949151794
-
Min-and max-relative entropies and a new entanglement monotone
-
Jun.
-
N. Datta, "Min-and max-relative entropies and a new entanglement monotone, " IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2816-2826, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2816-2826
-
-
Datta, N.1
-
19
-
-
17144413068
-
Distillation of secret key and entanglement from quantum states
-
Jan.
-
I. Devetak and A. Winter, "Distillation of secret key and entanglement from quantum states, " Proc. Roy. Soc. London A, vol. 461, no. 2053, pp. 207-235, Jan. 2005.
-
(2005)
Proc. Roy. Soc. London A
, vol.461
, Issue.2053
, pp. 207-235
-
-
Devetak, I.1
Winter, A.2
-
20
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, " SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
21
-
-
0022080529
-
A randomized protocol for signing contracts
-
Jun.
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts, " Commun. ACM, vol. 28, no. 6, pp. 637-647, Jun. 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
23
-
-
35048830930
-
Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
-
Berlin, Germany: Springer-Verlag
-
M. Fitzi, S. Wolf, and J. Wullschleger, "Pseudo-signatures, broadcast, and multi-party computation from correlated randomness, " in Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2004, pp. 562-578.
-
(2004)
Advances in Cryptology
, pp. 562-578
-
-
Fitzi, M.1
Wolf, S.2
Wullschleger, J.3
-
24
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gács and J. Körner, "Common information is far less than mutual information, " Problems Control Inf. Theory, vol. 2, no. 2, pp. 149-162, 1973.
-
(1973)
Problems Control Inf. Theory
, vol.2
, Issue.2
, pp. 149-162
-
-
Gács, P.1
Körner, J.2
-
25
-
-
0034497243
-
The relationship between public key encryption and oblivious transfer
-
Nov.
-
Y. Gertner, S. Kannan, T. Malkin, O. Reingold, and M. Viswanathan, "The relationship between public key encryption and oblivious transfer, " in Proc. 41st Annu. Symp. Found. Comput. Sci. (FOCS), Nov. 2000, pp. 325-335.
-
(2000)
Proc. 41st Annu. Symp. Found. Comput. Sci. (FOCS)
, pp. 325-335
-
-
Gertner, Y.1
Kannan, S.2
Malkin, T.3
Reingold, O.4
Viswanathan, M.5
-
26
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals-Part i
-
Aug.
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I, " IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
28
-
-
0038444459
-
General formulas for capacity of classical-quantum channels
-
Jul.
-
M. Hayashi and H. Nagaoka, "General formulas for capacity of classical-quantum channels, " IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1753-1768, Jul. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.7
, pp. 1753-1768
-
-
Hayashi, M.1
Nagaoka, H.2
-
30
-
-
84906546031
-
Secret key agreement: General capacity and second-order asymptotics
-
M. Hayashi, H. Tyagi, and S. Watanabe, "Secret key agreement: General capacity and second-order asymptotics, " in Proc. IEEE Int. Symp. Inf. Theory, Jun./Jul. 2014, pp. 1136-1140.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory, Jun./Jul.
, pp. 1136-1140
-
-
Hayashi, M.1
Tyagi, H.2
Watanabe, S.3
-
31
-
-
84946689015
-
Strong converse for a degraded wiretap channel via active hypothesis testing
-
M. Hayashi, H. Tyagi, and S. Watanabe, "Strong converse for a degraded wiretap channel via active hypothesis testing, " in Proc. Conf. Commun., Control, Comput. (Allerton), 2014, pp. 148-151.
-
(2014)
Proc. Conf. Commun., Control, Comput. (Allerton)
, pp. 148-151
-
-
Hayashi, M.1
Tyagi, H.2
Watanabe, S.3
-
32
-
-
36448960568
-
Robustness of quantum Markov chains
-
B. Ibinson, N. Linden, and A. Winter, "Robustness of quantum Markov chains, " Commun. Math. Phys., vol. 277, no. 2, pp. 289-304, 2008.
-
(2008)
Commun. Math. Phys.
, vol.277
, Issue.2
, pp. 289-304
-
-
Ibinson, B.1
Linden, N.2
Winter, A.3
-
33
-
-
39049122173
-
Efficient protocols achieving the commitment capacity of noisy correlations
-
H. Imai, K. Morozov, A. C. A. Nascimento, and A. Winter, "Efficient protocols achieving the commitment capacity of noisy correlations, " in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2006, pp. 1432-1436.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory, Jul.
, pp. 1432-1436
-
-
Imai, H.1
Morozov, K.2
Nascimento, A.C.A.3
Winter, A.4
-
34
-
-
0024866111
-
Pseudo-Random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions, " in Proc. 21st Annu. ACM Symp. Theory Comput. (STOC), 1989, pp. 12-24.
-
(1989)
Proc. 21st Annu. ACM Symp. Theory Comput. (STOC)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
36
-
-
84958540075
-
Information theoretic security for encryption based on conditional Rényi entropies
-
New York, NY, USA: Springer-Verlag
-
M. Iwamoto and J. Shikata, "Information theoretic security for encryption based on conditional Rényi entropies, " in Information Theoretic Security. New York, NY, USA: Springer-Verlag, 2014, pp. 103-121.
-
(2014)
Information Theoretic Security
, pp. 103-121
-
-
Iwamoto, M.1
Shikata, J.2
-
37
-
-
79952428986
-
A new dual to the Gács-Körner common information defined via the Gray-Wyner system
-
S. Kamath and V. Anantharam, "A new dual to the Gács-Körner common information defined via the Gray-Wyner system, " in Proc. 48th Annu. Conf. Commun., Control, Comput. (Allerton), 2010, pp. 1340-1346.
-
(2010)
Proc. 48th Annu. Conf. Commun., Control, Comput. (Allerton)
, pp. 1340-1346
-
-
Kamath, S.1
Anantharam, V.2
-
40
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
J. Kilian, "More general completeness theorems for secure two-party computation, " in Proc. 32nd Annu. Symp. Theory Comput. (STOC), 2000, pp. 316-324.
-
(2000)
Proc. 32nd Annu. Symp. Theory Comput. (STOC)
, pp. 316-324
-
-
Kilian, J.1
-
41
-
-
69449101829
-
The operational meaning of min-and max-entropy
-
Sep.
-
R. König, R. Renner, and C. Schaffner, "The operational meaning of min-and max-entropy, " IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4337-4347, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4337-4347
-
-
König, R.1
Renner, R.2
Schaffner, C.3
-
42
-
-
84857779174
-
Unconditional security from noisy quantum storage
-
Mar.
-
R. König, S. Wehner, and J. Wullschleger, "Unconditional security from noisy quantum storage, " IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1962-1984, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1962-1984
-
-
König, R.1
Wehner, S.2
Wullschleger, J.3
-
44
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
45
-
-
0034228863
-
Authentication theory and hypothesis testing
-
Jul.
-
U. M. Maurer, "Authentication theory and hypothesis testing, " IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
46
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar.
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information, " IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
47
-
-
84969779040
-
Common randomness for secure computing
-
P. Narayan, H. Tyagi, and S. Watanabe, "Common randomness for secure computing, " in Proc. IEEE Int. Symp. Inf. Theory, 2015, pp. 949-953.
-
(2015)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 949-953
-
-
Narayan, P.1
Tyagi, H.2
Watanabe, S.3
-
48
-
-
45249089615
-
On the oblivious-transfer capacity of noisy resources
-
Jun.
-
A. C. A. Nascimento and A. Winter, "On the oblivious-transfer capacity of noisy resources, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2572-2581, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2572-2581
-
-
Nascimento, A.C.A.1
Winter, A.2
-
49
-
-
0034316025
-
Strong converse and Stein's lemma in quantum hypothesis testing
-
Nov.
-
T. Ogawa and H. Nagaoka, "Strong converse and Stein's lemma in quantum hypothesis testing, " IEEE Trans. Inf. Theory, vol. 46, no. 7, pp. 2428-2433, Nov. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.7
, pp. 2428-2433
-
-
Ogawa, T.1
Nagaoka, H.2
-
51
-
-
3242749566
-
-
Ph.D. dissertation, Media Lab., Massachusetts Inst. Technol., Cambridge, MA, USA
-
R. S. Pappu, "Physical one-way functions, " Ph.D. dissertation, Media Lab., Massachusetts Inst. Technol., Cambridge, MA, USA, 2001.
-
(2001)
Physical One-way Functions
-
-
Pappu, R.S.1
-
52
-
-
77951624674
-
Channel coding rate in the finite blocklength regime
-
May
-
Y. Polyanskiy, H. V. Poor, and S. Verdú, "Channel coding rate in the finite blocklength regime, " IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2307-2359
-
-
Polyanskiy, Y.1
Poor, H.V.2
Verdú, S.3
-
53
-
-
79952387980
-
Arimoto channel coding converse and Rényi divergence
-
Y. Polyanskiy and S. Verdú, "Arimoto channel coding converse and Rényi divergence, " in Proc. 48th Annu. Conf. Commun., Control, Comput. (Allerton), Sep./Oct. 2010, pp. 1327-1333.
-
(2010)
Proc. 48th Annu. Conf. Commun., Control, Comput. (Allerton), Sep./Oct.
, pp. 1327-1333
-
-
Polyanskiy, Y.1
Verdú, S.2
-
54
-
-
84901268112
-
Assisted common information with an application to secure two-party sampling
-
Jun.
-
V. M. Prabhakaran and M. M. Prabhakaran, "Assisted common information with an application to secure two-party sampling, " IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3413-3434, Jun. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.6
, pp. 3413-3434
-
-
Prabhakaran, V.M.1
Prabhakaran, M.M.2
-
55
-
-
77953754678
-
-
Aiken Comput. Lab. Harvard Univ., Tech. Rep. TR81. [Online]
-
M. O. Rabin. (2005). "How to exchange secrets with oblivious transfer, " Aiken Comput. Lab. Harvard Univ., Tech. Rep. TR81. [Online]. Available: http://eprint.iacr.org/
-
(2005)
How to Exchange Secrets with Oblivious Transfer
-
-
Rabin, M.O.1
-
56
-
-
82955173801
-
On the efficiency of bit commitment reductions
-
S. Ranellucci, A. Tapp, S. Winkler, and J. Wullschleger, "On the efficiency of bit commitment reductions, " in Proc. ASIACRYPT, 2011, pp. 520-537.
-
(2011)
Proc. ASIACRYPT
, pp. 520-537
-
-
Ranellucci, S.1
Tapp, A.2
Winkler, S.3
Wullschleger, J.4
-
57
-
-
84929305384
-
A new upperbound for the oblivious transfer capacity of discrete memoryless channels
-
K. S. Rao and V. M. Prabhakaran, "A new upperbound for the oblivious transfer capacity of discrete memoryless channels, " in Proc. IEEE Inf. Theory Workshop, Nov. 2014, pp. 35-39.
-
(2014)
Proc. IEEE Inf. Theory Workshop, Nov.
, pp. 35-39
-
-
Rao, K.S.1
Prabhakaran, V.M.2
-
58
-
-
33846181385
-
-
Ph.D. dissertation, Dept. Comput. Sci., ETH Zürich, Zürich, Switzerland
-
R. Renner, "Security of quantum key distribution, " Ph.D. dissertation, Dept. Comput. Sci., ETH Zürich, Zürich, Switzerland, 2005.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
59
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction, " in Proc. EUROCRYPT, 2003, pp. 562-577.
-
(2003)
Proc. EUROCRYPT
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
60
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification, " in Proc. ASIACRYPT, 2005, pp. 199-216.
-
(2005)
Proc. ASIACRYPT
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
62
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems, " Bell Syst. Te ch. J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
64
-
-
84886705884
-
A tight upper bound for the third-order asymptotics for most discrete memoryless channels
-
Nov.
-
M. Tomamichel and V. Y. F. Tan, "A tight upper bound for the third-order asymptotics for most discrete memoryless channels, " IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7041-7051, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.11
, pp. 7041-7051
-
-
Tomamichel, M.1
Tan, V.Y.F.2
-
65
-
-
0242291643
-
An information theoretical identity and a problem involving capacity
-
F. Topsøe, "An information theoretical identity and a problem involving capacity, " Stud. Sci. Math. Hungary, vol. 2, pp. 291-292, 1967.
-
(1967)
Stud. Sci. Math. Hungary
, vol.2
, pp. 291-292
-
-
Topsøe, F.1
-
66
-
-
84892351140
-
-
New York, NY, USA: Springer-Verlag
-
P. Tuyls, B. Škorić, and T. Kevenaar, Eds., Security With Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting. New York, NY, USA: Springer-Verlag, 2007.
-
(2007)
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
-
-
Tuyls, P.1
Škorić, B.2
Kevenaar, T.3
-
67
-
-
84882989241
-
Common information and secret key capacity
-
Sep.
-
H. Tyagi, "Common information and secret key capacity, " IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5627-5640, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5627-5640
-
-
Tyagi, H.1
-
68
-
-
84882971734
-
How many queries will resolve common randomness?
-
Sep.
-
H. Tyagi and P. Narayan, "How many queries will resolve common randomness?" IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5363-5378, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5363-5378
-
-
Tyagi, H.1
Narayan, P.2
-
69
-
-
80053961199
-
When is a function securely computable?
-
Oct.
-
H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6337-6350, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6337-6350
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
71
-
-
84969771402
-
Interactive communication for data exchange
-
H. Tyagi, P. Viswanath, and S. Watanabe, "Interactive communication for data exchange, " in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2015, pp. 1806-1810.
-
(2015)
Proc. IEEE Int. Symp. Inf. Theory, Jun.
, pp. 1806-1810
-
-
Tyagi, H.1
Viswanath, P.2
Watanabe, S.3
-
72
-
-
84897728191
-
Secret key capacity for multipleaccess channel with public feedback
-
H. Tyagi and S. Watanabe, "Secret key capacity for multipleaccess channel with public feedback, " in Proc. 51st Annu. Allerton Conf. Commun., Control, Comput. (Allerton), 2013, pp. 1-7.
-
(2013)
Proc. 51st Annu. Allerton Conf. Commun., Control, Comput. (Allerton)
, pp. 1-7
-
-
Tyagi, H.1
Watanabe, S.2
-
73
-
-
84901684455
-
A bound for multiparty secret key agreement and implications for a problem of secure computing
-
H. Tyagi and S. Watanabe, "A bound for multiparty secret key agreement and implications for a problem of secure computing, " in Proc. EUROCRYPT, 2014, pp. 369-386.
-
(2014)
Proc. EUROCRYPT
, pp. 369-386
-
-
Tyagi, H.1
Watanabe, S.2
-
74
-
-
0032025985
-
Entanglement measures and purification procedures
-
Mar.
-
V. Vedral and M. B. Plenio, "Entanglement measures and purification procedures, " Phys. Rev. A, vol. 57, pp. 1619-1633, Mar. 1998.
-
(1998)
Phys. Rev. A
, vol.57
, pp. 1619-1633
-
-
Vedral, V.1
Plenio, M.B.2
-
75
-
-
84861651671
-
One-shot classical-quantum capacity and hypothesis testing
-
May
-
L. Wang and R. Renner, "One-shot classical-quantum capacity and hypothesis testing, " Phys. Rev. Lett., vol. 108, no. 20, p. 200501, May 2012.
-
(2012)
Phys. Rev. Lett.
, vol.108
, Issue.20
, pp. 200501
-
-
Wang, L.1
Renner, R.2
-
76
-
-
84886667603
-
Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy
-
S. Watanabe and M. Hayashi, "Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy, " in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2013, pp. 2715-2719.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory, Jul.
, pp. 2715-2719
-
-
Watanabe, S.1
Hayashi, M.2
-
78
-
-
77953162623
-
Implementation of two-party protocols in the noisy-storage model
-
May
-
S. Wehner, M. Curty, C. Schaffner, and H.-K. Lo, "Implementation of two-party protocols in the noisy-storage model, " Phys. Rev. A, vol. 81, no. 5, p. 052336, May 2010.
-
(2010)
Phys. Rev. A
, vol.81
, Issue.5
, pp. 052336
-
-
Wehner, S.1
Curty, M.2
Schaffner, C.3
Lo, H.-K.4
-
79
-
-
84901321090
-
On the efficiency of classical and quantum secure function evaluation
-
Jun.
-
S. Winkler and J. Wullschleger, "On the efficiency of classical and quantum secure function evaluation, " IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3123-3143, Jun. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.6
, pp. 3123-3143
-
-
Winkler, S.1
Wullschleger, J.2
-
80
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
A. Winter, A. C. A. Nascimento, and H. Imai, "Commitment capacity of discrete memoryless channels, " in Proc. Cryptogr. Coding, 2003, pp. 35-51.
-
(2003)
Proc. Cryptogr. Coding
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
81
-
-
33746074792
-
Oblivious transfer is symmetric
-
S. Wolf and J. Wullschleger, "Oblivious transfer is symmetric, " in Proc. EUROCRYPT, 2006, pp. 222-232.
-
(2006)
Proc. EUROCRYPT
, pp. 222-232
-
-
Wolf, S.1
Wullschleger, J.2
-
82
-
-
45249110618
-
New monotones and lower bounds in unconditional two-party computation
-
Jun.
-
S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2792-2797, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2792-2797
-
-
Wolf, S.1
Wullschleger, J.2
|