Helper-assisted asymmetric two key generation
暂无分享,去创建一个
[1] Chunxuan Ye,et al. Information Theoretic Generation of Multiple Secret Keys , 2005 .
[2] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[3] Hua Wang,et al. The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation , 2014, IEEE Transactions on Information Theory.
[4] Hua Wang,et al. Secret key-private key generation over three terminals: Capacity region , 2014, 2014 IEEE International Symposium on Information Theory.
[5] Rudolf Ahlswede,et al. Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.
[6] Imre Csiszár,et al. Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.
[7] Prakash Narayan,et al. The secret key~private key capacity region for three terminals , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[8] Chung Chan,et al. Mutual dependence for secret key agreement , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[9] R. A. McDonald,et al. Noiseless Coding of Correlated Information Sources , 1973 .
[10] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[11] I. Csiszár,et al. Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).
[12] Yingbin Liang,et al. Key capacity region for a cellular source model , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).