메뉴 건너뛰기




Volumn 62, Issue 7, 2016, Pages 3796-3810

Secret Key Agreement: General Capacity and Second-Order Asymptotics

Author keywords

[No Author keywords available]

Indexed keywords

ASYMPTOTIC ANALYSIS;

EID: 84976504932     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2016.2567440     Document Type: Article
Times cited : (48)

References (35)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csisziàr, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csisziàr, I.2
  • 2
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography-Part II: CR capacity
    • Jan.
    • R. Ahlswede and I. Csisziàr, "Common randomness in information theory and cryptography-Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahlswede, R.1    Csisziàr, I.2
  • 4
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csisziàr and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csisziàr, I.1    Narayan, P.2
  • 5
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • Jun.
    • I. Csisziàr and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csisziàr, I.1    Narayan, P.2
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 9
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals-Part i
    • Aug.
    • A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.A.1    Anantharam, V.2
  • 11
    • 0027602480 scopus 로고
    • Approximation theory of output statistics
    • May
    • T. S. Han and S. Verdú, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 752-772
    • Han, T.S.1    Verdú, S.2
  • 13
    • 54749144274 scopus 로고    scopus 로고
    • Second-order asymptotics in fixed-length source coding and intrinsic randomness
    • Oct.
    • M. Hayashi, "Second-order asymptotics in fixed-length source coding and intrinsic randomness," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4619-4637, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4619-4637
    • Hayashi, M.1
  • 14
    • 70350714497 scopus 로고    scopus 로고
    • Information spectrum approach to second-order coding rate in channel coding
    • Nov.
    • M. Hayashi, "Information spectrum approach to second-order coding rate in channel coding," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 4947-4966, Nov. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.11 , pp. 4947-4966
    • Hayashi, M.1
  • 15
    • 0038444459 scopus 로고    scopus 로고
    • General formulas for capacity of classical-quantum channels
    • Jul.
    • M. Hayashi and H. Nagaoka, "General formulas for capacity of classical-quantum channels," IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1753-1768, Jul. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.7 , pp. 1753-1768
    • Hayashi, M.1    Nagaoka, H.2
  • 16
    • 84906546031 scopus 로고    scopus 로고
    • Secret key agreement: General capacity and second-order asymptotics
    • Nov.
    • M. Hayashi, H. Tyagi, S. Watanabe, "Secret key agreement: General capacity and second-order asymptotics," in Proc. IEEE Int. Symp. Inf. Theory, Nov. 2014, pp. 1136-1140.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory , pp. 1136-1140
    • Hayashi, M.1    Tyagi, H.2    Watanabe, S.3
  • 18
    • 84873562821 scopus 로고    scopus 로고
    • On the redundancy of variable-rate Slepian-Wolf coding
    • S. Kuzuoka, "On the redundancy of variable-rate Slepian-Wolf coding," in Proc. Int. Symp. Inf. Theory Appl. (ISITA), 2012, pp. 155-159.
    • (2012) Proc. Int. Symp. Inf. Theory Appl. (ISITA) , pp. 155-159
    • Kuzuoka, S.1
  • 19
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 20
    • 0029369320 scopus 로고
    • Coding theorems on correlated general sources
    • S. Miyake and F. Kanaya, "Coding theorems on correlated general sources," IEICE Trans. Fundam., vols. E78-A, no. 9, pp. 1063-1070, 1995.
    • (1995) IEICE Trans. Fundam., Vols. E78-A , Issue.9 , pp. 1063-1070
    • Miyake, S.1    Kanaya, F.2
  • 23
    • 77951624674 scopus 로고    scopus 로고
    • Channel coding rate in the finite blocklength regime
    • May
    • Y. Polyanskiy, H. V. Poor, S. Verdú, "Channel coding rate in the finite blocklength regime," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.5 , pp. 2307-2359
    • Polyanskiy, Y.1    Poor, H.V.2    Verdú, S.3
  • 24
    • 33846181385 scopus 로고    scopus 로고
    • Ph.D. dissertation Dept. Phys., ETH Zurich Univ., Zürich, Switzerland
    • R. Renner, "Security of quantum key distribution," Ph.D. dissertation, Dept. Phys., ETH Zurich Univ., Zürich, Switzerland, 2005.
    • (2005) Security of Quantum Key Distribution
    • Renner, R.1
  • 25
    • 33646767482 scopus 로고    scopus 로고
    • Simple and tight bounds for information reconciliation and privacy amplification
    • R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification," in Proc. ASIACRYPT, 2005, pp. 199-216.
    • (2005) Proc. ASIACRYPT , pp. 199-216
    • Renner, R.1    Wolf, S.2
  • 26
    • 84976485950 scopus 로고    scopus 로고
    • On the absolute constants in the Berry-Esseen type inequalities for identically distributed summands
    • I. Shevtsova, "On the absolute constants in the Berry-Esseen type inequalities for identically distributed summands," CoRR, 2011.
    • (2011) CoRR
    • Shevtsova, I.1
  • 27
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • Jul.
    • D. Slepian and J. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471-480, Jul. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.2
  • 28
    • 52349101372 scopus 로고
    • Asymptotische abschätzungen in Shannon's informationstheorie
    • V. Strassen, "Asymptotische abschätzungen in Shannon's informationstheorie," in Proc. Third Prague Conf. Inf. Theory, 1962, pp. 689-723. [Online]. Available: http://www.math.cornell.edu/?pmlut/strassen.pdf
    • (1962) Proc. Third Prague Conf. Inf. Theory , pp. 689-723
    • Strassen, V.1
  • 29
    • 0000649228 scopus 로고
    • The existence of probability measures with given marginals
    • V. Strassen, "The existence of probability measures with given marginals," Ann. Math. Statist., vol. 36, no. 2, pp. 423-439, 1965.
    • (1965) Ann. Math. Statist. , vol.36 , Issue.2 , pp. 423-439
    • Strassen, V.1
  • 30
    • 84901667878 scopus 로고    scopus 로고
    • Ph.D. dissertation Dept. Electr. Comput. Eng., Univ. Maryland, College Park MD, USA
    • H. Tyagi, "Common randomness principles of secrecy," Ph.D. dissertation, Dept. Electr. Comput. Eng., Univ. Maryland, College Park, MD, USA, 2013.
    • (2013) Common Randomness Principles of Secrecy
    • Tyagi, H.1
  • 31
    • 84882971734 scopus 로고    scopus 로고
    • How many queries will resolve common randomness?
    • Sep.
    • H. Tyagi and P. Narayan, "How many queries will resolve common randomness?" IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5363-5378, Sep. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.9 , pp. 5363-5378
    • Tyagi, H.1    Narayan, P.2
  • 32
    • 84939864518 scopus 로고    scopus 로고
    • Converses for secret key agreement and secure computing
    • Sep.
    • H. Tyagi and S. Watanabe, "Converses for secret key agreement and secure computing," IEEE Trans. Inf. Theory, vol. 61, no. 9, pp. 4809-4827, Sep. 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.9 , pp. 4809-4827
    • Tyagi, H.1    Watanabe, S.2
  • 33
    • 84901684455 scopus 로고    scopus 로고
    • A bound for multiparty secret key agreement and implications for a problem of secure computing
    • H. Tyagi and S. Watanabe, "A bound for multiparty secret key agreement and implications for a problem of secure computing," in Proc. EUROCRYPT, 2014, pp. 369-386.
    • (2014) Proc. EUROCRYPT , pp. 369-386
    • Tyagi, H.1    Watanabe, S.2
  • 34
    • 84861651671 scopus 로고    scopus 로고
    • One-shot classical-quantum capacity and hypothesis testing
    • May
    • L. Wang and R. Renner, "One-shot classical-quantum capacity and hypothesis testing," Phys. Rev. Lett., vol. 108, no. 20, p. 200501, May 2012.
    • (2012) Phys. Rev. Lett. , vol.108 , Issue.20 , pp. 200501
    • Wang, L.1    Renner, R.2
  • 35
    • 34548771769 scopus 로고    scopus 로고
    • Key rate of quantum key distribution with hashed two-way classical communication
    • Sep.
    • S. Watanabe, R. Matsumoto, T. Uyematsu, Y. Kawano, "Key rate of quantum key distribution with hashed two-way classical communication," Phys. Rev. A, vol. 76, no. 3, p. 032312, Sep. 2007.
    • (2007) Phys. Rev. A , vol.76 , Issue.3 , pp. 032312
    • Watanabe, S.1    Matsumoto, R.2    Uyematsu, T.3    Kawano, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.