2009
DOI: 10.1007/978-3-642-01001-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Key Agreement from Close Secrets over Unsecured Channels

Abstract: We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also known as information reconciliation and privacy amplification over unsecured channels, was shown to be theoretically feasible by Renner and Wolf (Eurocrypt 2004), although no protocol that runs in polynomial time was described. We propose a protocol that is not only polynomial-time, but actually practical, requiring only a few seconds… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
77
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 57 publications
(77 citation statements)
references
References 25 publications
0
77
0
Order By: Relevance
“…Such an algorithm is called a computational fuzzy conductor. See [KR09] for the definition of a fuzzy conductor. To the best of our knowledge, a computational fuzzy conductor has not been defined in the literature, the natural definition is to replace the pseudorandomness condition in Definition 2.5 with a HILL entropy requirement.…”
Section: Avoiding Sketch Entropy Upper Boundsmentioning
confidence: 99%
“…Such an algorithm is called a computational fuzzy conductor. See [KR09] for the definition of a fuzzy conductor. To the best of our knowledge, a computational fuzzy conductor has not been defined in the literature, the natural definition is to replace the pseudorandomness condition in Definition 2.5 with a HILL entropy requirement.…”
Section: Avoiding Sketch Entropy Upper Boundsmentioning
confidence: 99%
“…This work proved the theoretical feasibility of perfect pairwise secrets (assuming Alice is connected to Eve through an idealized channel). This triggered a significant body of theoretical work [22,23,29,24,25,26,16], which also addressed the scenario of multiple terminals [9]. More recently, researchers have started to propose concrete, implementable protocols for creating pairwise shared secrets in wireless networks.…”
Section: Related Workmentioning
confidence: 99%
“…The case where Alice and Bob share highly-correlated, but possibly unequal keys-the "fuzzy" case-is addressed in [RW04] and improved upon by Kanukurthi and Reyzin [KR09], but also covered by [DW09] and [CKOR10].…”
Section: Related Workmentioning
confidence: 99%