1993
DOI: 10.1109/18.256484
|View full text |Cite
|
Sign up to set email alerts
|

Secret key agreement by public discussion from common information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

8
1,718
1
4

Year Published

2004
2004
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 1,769 publications
(1,731 citation statements)
references
References 12 publications
8
1,718
1
4
Order By: Relevance
“…Christian Cachin and Ueli Maurer [16] demonstrated that CITSKA is possible in the bounded-storage model, in which the adversaries can only store a limited amount of data. Introducing the idea of advantage distillation, Maurer later generalized the previous models and showed that CITSKA is possible over a wide class of classical channels [17].…”
Section: Classical Public-key Cryptography and Secret Key Agreementmentioning
confidence: 99%
See 1 more Smart Citation
“…Christian Cachin and Ueli Maurer [16] demonstrated that CITSKA is possible in the bounded-storage model, in which the adversaries can only store a limited amount of data. Introducing the idea of advantage distillation, Maurer later generalized the previous models and showed that CITSKA is possible over a wide class of classical channels [17].…”
Section: Classical Public-key Cryptography and Secret Key Agreementmentioning
confidence: 99%
“…The existing work on (classical) secret key agreement by public discussion, studied in the framework of information-theoretic cryptography [17], has played an important role in QKD security proofs and it is interesting to see that QKD has conversely also triggered some important development in classical information-theoretic cryptography [37]. However, classical models are in general not sufficient to capture all the information that can be learnt by a quantum eavesdropper, and QKD security proofs must rely on elements of quantum information theory.…”
Section: Quantum Key Agreement -Quantum Key Distribution (Qkd)mentioning
confidence: 99%
“…Previous Work: Information-theoretically secure secret-key agreement from correlated information has first been proposed by Maurer in [11]. He considered a setting where Alice, Bob, and Eve hold many independent realizations of correlated random variables X, Y , and Z, respectively, with joint probability distribution P XY Z .…”
Section: Secret-key Agreementmentioning
confidence: 99%
“…For example, Wyner [20] and, subsequently, Csiszár and Körner [3] have studied a scenario where Alice and Bob are connected by a noisy channel on which an adversary has only limited access. Maurer [11] (cf. also [1]) proposed to consider a setting where a satellite broadcasts uniform random bits with low signal intensity, such that Alice, Bob, and also Eve cannot receive them perfectly.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation