Secret key agreement by public discussion from common information
From MaRDI portal
Publication:4277133
DOI10.1109/18.256484zbMath0784.94018OpenAlexW2106833918MaRDI QIDQ4277133
Publication date: 7 February 1994
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/651e36f3e08716be672ba8d1dc9387f4369a7559
provable securityprivacy amplificationbroadcast channelwire-tap channelsecret key agreementpublic discussion protocolsscrecy capacity
Related Items
Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio, Intercept capacity: unknown unitary transformation, Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement, Simultaneous Secrecy and Reliability Amplification for a General Channel Model, Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information, Realization of error correction and reconciliation of continuous quantum key distribution in detail, On the (im)possibility of non-interactive correlation distillation, Error correcting codes, block designs, perfect secrecy and finite fields, Basics of Secrecy Coding, Lower limits of spin detection efficiency for two-parameter two-qubit (TPTQ) states with non-ideal ferromagnetic detectors, Common randomness and distributed control: A counterexample, Linking information reconciliation and privacy amplification, Information theoretically secure key sharing protocol executing with constant noiseless public channels, Channels of small log-ratio leakage and characterization of two-party differentially private computation, Cryptanalysis of quantum digital signature for the access control of sensitive data, Asymptotically optimal prepare-measure quantum key distribution protocol, Wireless-channel key exchange, Complete characterization of broadcast and pseudo-signatures from correlations, Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation, Improving classical authentication over a quantum channel, When Are Fuzzy Extractors Possible?, Public and private resource trade-offs for a quantum channel, De Finetti theorems for quantum conditional probability distributions with symmetry, Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation, Resource requirements of private quantum channels and consequences for oblivious remote state preparation, (Secure) linear network coding multicast, A storage complexity based analogue of Maurer key establishment using public channels, SECURITY OF QUANTUM KEY DISTRIBUTION, The effect of side-information on smooth entropy., ON STANDARDS AND SPECIFICATIONS IN QUANTUM CRYPTOGRAPHY, Long term confidentiality: a survey, Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA, Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols, Using quantum key distribution for cryptographic purposes: a survey, An operational characterization of mutual information in algorithmic information theory, Security risk during the transient in a key exchange protocol using random signals and feedback, Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna, A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication, Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming, QUANTUM IDENTITY AUTHENTICATION USING GAUSSIAN-MODULATED SQUEEZED STATES, QUANTUM ENTANGLEMENT AND SECRECY, Strong Secrecy for Multiple Access Channels, On Oblivious Transfer Capacity, A reversible theory of entanglement and its relation to the second law, Quantum relays for long distance quantum cryptography, Composition Implies Adaptive Security in Minicrypt, Unnamed Item, Dimension Reduction for Polynomials over Gaussian Space and Applications, Reusable fuzzy extractors for low-entropy distributions, Quantum entanglement, Distillation of secret-key from a class of compound memoryless quantum sources, From Bell’s Theorem to Secure Quantum Key Distribution, Strong Secrecy for Wireless Channels (Invited Talk), Quantum privacy and quantum wiretap channels, Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States, Improved semi-quantum key distribution with two almost-classical users, Cryptanalysis of multiparty quantum digital signatures, An Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage Model, Distilling entanglement with noisy operations