Error correcting codes, block designs, perfect secrecy and finite fields (Q850774)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Error correcting codes, block designs, perfect secrecy and finite fields |
scientific article |
Statements
Error correcting codes, block designs, perfect secrecy and finite fields (English)
0 references
6 November 2006
0 references
This paper addresses a solution to the necessity of key exchange prior to a cryptographic communication between two parties. An algorithm to establish a common key through public discussion under the assumption that the communicants posses keys of a common length \(N\) which are not necessarily equal but whose mutual information is non-zero is analyzed. The algorithm in question was originally introduced by \textit{C. H. Bennett, F. Bessette, G. Brassard, L. Salvail} and \textit{J. Smolin} [Experimental quantum cryptography. J. Cryptol. 5, No. 1, 3--28 (1992; Zbl 1114.94005)] a preliminary version was given in [Advances in Cryptology-- Eurocrypt '90 Proceedings, Berlin-Heidelberg-New York: Springer, Lect. Notes Comput. Sci. 473, 253--265 (1991)]. In the paper under review, it is shown that under modest assumptions the algorithm does indeed converge to a non-empty key. In fact, the paper includes a method to calculate a good choice of \(N\) in order to efficiently arrive at a common key of a prefixed desired length \(n\).
0 references
hash functions
0 references
finite fields
0 references
secret key distillation
0 references
perfect secrecy
0 references