Generalized privacy amplification

作者: C.H. Bennett , G. Brassard , C. Crepeau , U.M. Maurer

DOI: 10.1109/18.476316

关键词:

摘要: … general privacy amplification scenario considered in this paper is described and various types of side information available to an eavesdropper are discussed. Privacy amplification by …

参考文章(32)
Valery Korzhik, Victor Yakovlev, Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept theory and application of cryptographic techniques. pp. 183- 195 ,(1992) , 10.1007/3-540-57220-1_61
Gilles Brassard, Charles H Bennett, Jean-Marc Robert, How to reduce your enemy's information international cryptology conference. pp. 468- 476 ,(1986)
Ueli M. Maurer, The Strong Secret Key Rate of Discrete Random Triples Springer, Boston, MA. pp. 271- 285 ,(1994) , 10.1007/978-1-4615-2694-0_27
Charles H. Bennett, Gilles Brassard, Jean-Marc Robert, How to Reduce Your Enemy's Information (Extended Abstract) international cryptology conference. pp. 468- 476 ,(1985) , 10.1007/3-540-39799-X_37
Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska, Practical Quantum Oblivious Transfer international cryptology conference. pp. 351- 366 ,(1991) , 10.1007/3-540-46766-1_29
Gilles Brassard, Louis Salvail, Secret-key reconciliation by public discussion theory and application of cryptographic techniques. pp. 410- 423 ,(1994) , 10.1007/3-540-48285-7_35
Mark N. Wegman, J.Lawrence Carter, New hash functions and their use in authentication and set equality Journal of Computer and System Sciences. ,vol. 22, pp. 265- 279 ,(1981) , 10.1016/0022-0000(81)90033-7
Michael T. Goodrich, Parallel algorithms column 1 ACM SIGACT News. ,vol. 24, pp. 16- 21 ,(1993) , 10.1145/164996.165002