메뉴 건너뛰기




Volumn 1666, Issue , 1999, Pages 47-65

Information-theoretic cryptography

Author keywords

Conditional in dependence; Generalized random oracle; Information theory; Information theoretic primitive; Unconditional security

Indexed keywords

COMPUTATION THEORY; INFORMATION THEORY;

EID: 84957050617     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48405-1_4     Document Type: Conference Paper
Times cited : (54)

References (48)
  • 18
    • 84957697395 scopus 로고    scopus 로고
    • On the (Im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • Springer-Verlag
    • I. Damgård, J. Kilian, and L. Salvail, On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions, Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science, vol. 1592, pp 56-73, Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science , vol.1592 , pp. 56-73
    • Damgård, I.1    Kilian, J.2    Salvail, L.3
  • 22
    • 0008814479 scopus 로고    scopus 로고
    • Bounds on secret key exchange using a random deal of cards
    • Springer-Verlag
    • M. J. Fischer and R. N. Wright, Bounds on secret key exchange using a random deal of cards, Journal of Cryptology, vol. 9, no. 2, pp 71-99, Springer-Verlag, 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.2 , pp. 71-99
    • Fischer, M.J.1    Wright, R.N.2
  • 27
    • 33745533362 scopus 로고
    • Construction of a pseudorandom generator from any one-way function
    • ICSI, Berkeley, CA
    • J. H_astad, R. Impagliazzo, L. Levin, and M. Luby, Construction of a pseudorandom generator from any one-way function, Technical Report no. 91-068, ICSI, Berkeley, CA, 1991.
    • (1991) Technical Report , vol.91
    • H_Astad, J.1    Impagliazzo, R.2    Levin, L.3    Luby, M.4
  • 29
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • M. Luby and C. Racko_, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, vol. 17, no. 2, pp 373-386, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Racko_, C.2
  • 30
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Springer-Verlag
    • U. M. Maurer, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, vol. 5, pp. 53-66, Springer-Verlag, 1992.
    • (1992) Journal of Cryptology , vol.5 , pp. 53-66
    • Maurer, U.M.1
  • 32
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol. 39, no. 3, pp 733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 34
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by NOT authenticated public discussion
    • Springer-Verlag
    • U. M. Maurer, Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science, vol. 1233, pp 209-225, Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Computer Science , vol.1233 , pp. 209-225
    • Maurer, U.M.1
  • 35
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • U. M. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, vol. 45, no. 2, pp 499-514, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 36
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudorandom permutations: Luby-Rackoff revisited
    • M. Naor and O. Reingold, On the construction of pseudorandom permutations: Luby-Rackoff revisited, Journal of Cryptology, vol. 12, no. 1, pp 29-66, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 39
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol. 28, pp 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 40
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, A mathematical theory of communication, Bell System Technical Journal, vol. 27, pp 379-423 and 623-656, 1948.
    • (1948) Bell System Technical Journal , vol.27
    • Shannon, C.E.1
  • 41
    • 0024015453 scopus 로고
    • A survey of information authentication
    • G. J. Simmons, A survey of information authentication, Proceedings of the IEEE, vol. 76, pp 603-620, 1988.
    • (1988) Proceedings of the IEEE , vol.76 , pp. 603-620
    • Simmons, G.J.1
  • 43
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. S. Vernam, Cipher printing telegraph systems for secret wire and radio telegraphic communications, Journal of the American Institute for Electrical Engineers, vol. 55, pp 109-115, 1926.
    • (1926) Journal of the American Institute for Electrical Engineers , vol.55 , pp. 109-115
    • Vernam, G.S.1
  • 44
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol. 22, pp 265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 45
    • 84947780088 scopus 로고    scopus 로고
    • Strong security against active attacks in information-theoretic secret-key agreement
    • Springer-Verlag
    • S. Wolf, Strong security against active attacks in information-theoretic secret-key agreement, Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science, vol. 1514, pp 405-419, Springer-Verlag, 1998.
    • (1998) Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Computer Science , vol.1514 , pp. 405-419
    • Wolf, S.1
  • 46
    • 30444442452 scopus 로고    scopus 로고
    • Unconditional security in cryptography
    • July 1998, Aarhus, Denmark, Lecture Notes in Computer Science, Springer-Verlag
    • S. Wolf, Unconditional security in cryptography, Proceedings of Summer School in Cryptology and Data Security, July 1998, Aarhus, Denmark, Lecture Notes in Computer Science, vol. 1561, pp 217-250, Springer-Verlag, 1999.
    • (1999) Proceedings of Summer School in Cryptology and Data Security , vol.1561 , pp. 217-250
    • Wolf, S.1
  • 48
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, The wire-tap channel, Bell System Technical Journal, vol. 54, no. 8, pp 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.