搜索结果: 1-6 共查到“Secret-Key Agreement”相关记录6条 . 查询时间(0.078 秒)
Information-Theoretic Secret-Key Agreement: The Secret-Key Rate as a Function of the Channel Quality Ratio
Secret-Key Agreement Information-theoretic security Satellite model
2017/11/28
Information theoretically secure secret-key exchange between two parties, Alice and Bob, is a well-studied problem that is provably impossible without additional assumptions. However, it has shown to ...
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
oblivious transfer elastic channels key agreement
2016/2/23
A (γ,δ)-elastic channel is a binary symmetric channel between a sender and a receiver where the error rate of an honest receiver is δ while the error rate of a dishonest receiver lies within the inter...
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
secret key agreement single shot bound secure computing
2016/1/26
We consider secret key agreement by multiple parties observing
correlated data and communicating interactively over an insecure
communication channel. Our main contribution is a single-shot upper
b...
The Sender-Excited Secret Key Agreement Model: Capacity and Error Exponents
Secret key capacity Common randomness Wiretap channel Sender-excitation Reliability exponent Secrecy exponent
2011/9/16
Abstract: We consider fundamental limits of the secret key generation problem when the sources are randomly excited by the sender and there is a noiseless public discussion channel. In many practical ...
Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication
Secret Key Agreement Vector Gaussian Sources Rate Limited Public Communication
2010/12/14
We investigate the secret key agreement from correlated vector Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class
of protocols with the...
Secret-key Agreement with Channel State Information at the Transmitter
Secret-key Agreement Channel State Information
2010/12/7
We study the capacity of secret-key agreement over a wiretap channel with state parameters. The transmitter communicates to the legitimate receiver and the eavesdropper over a discrete memoryless wire...