2000
DOI: 10.1007/3-540-44929-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Characterization of Optimal Key Set Protocols

Abstract: Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a common one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by the so-called key set protocol. In this paper we give a necessary and sufficient condition for a key set protocol to be "optimal," that is, to succeed always in sharing a one-bit secret key.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2001
2001
2001
2001

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Asimple necessary and sufficient condition for $\gamma$ $\in W$ has been known $ [2,8]$ . Furthermore, acharacterization of "optimal" key set protocols is given in [7].…”
Section: Key Set Protocolmentioning
confidence: 99%
“…Asimple necessary and sufficient condition for $\gamma$ $\in W$ has been known $ [2,8]$ . Furthermore, acharacterization of "optimal" key set protocols is given in [7].…”
Section: Key Set Protocolmentioning
confidence: 99%