Privacy amplification with asymptotically optimal entropy loss
From MaRDI portal
Publication:5501933
DOI10.1145/2630064zbMATH Open1321.94103OpenAlexW2024766111MaRDI QIDQ5501933FDOQ5501933
Authors: Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin
Publication date: 14 August 2015
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2630064
Recommendations
authentication protocolskey agreementcryptographic protocolserror-correcting codesinformation-theoretic key agreement
Cites Work
- Universal classes of hash functions
- A Pseudorandom Generator from any One-way Function
- Generalized privacy amplification
- Privacy Amplification by Public Discussion
- Secure Authentication from a Weak Key, without Leaking Information
- Randomness is linear in space
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
- Secure Remote Authentication Using Biometric Data
- Asymptotically good codes correcting insertions, deletions, and transpositions
- Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
- Extracting correlations
- Title not available (Why is that?)
- Non-malleable extractors and symmetric key cryptography from weak secrets
- Title not available (Why is that?)
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- Advances in Cryptology - CRYPTO 2003
- Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets
- Key Agreement from Close Secrets over Unsecured Channels
- Privacy amplification with asymptotically optimal entropy loss
- Design extractors, non-malleable condensers and privacy amplification
- Nonmalleable extractors with short seeds and applications to privacy amplification
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
Cited In (9)
- Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification
- Title not available (Why is that?)
- A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
- Computational fuzzy extractors
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Nonmalleable extractors and codes, with their many tampered extensions
- Key Agreement from Close Secrets over Unsecured Channels
- Privacy amplification with asymptotically optimal entropy loss
- Noisy Channel Coding via Privacy Amplification and Information Reconciliation
This page was built for publication: Privacy amplification with asymptotically optimal entropy loss
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5501933)