Secret key generation for pairwise independent networks with curious helpers
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[3] Suhas N. Diggavi,et al. Creating secrets out of erasures , 2013, MobiCom.
[4] Himanshu Tyagi,et al. Multiterminal Secrecy by Public Discussion , 2016, Found. Trends Commun. Inf. Theory.
[5] Hai Jiang,et al. Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.
[6] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[7] George K. Karagiannidis,et al. On the Private Key Capacity of the $M$ -Relay Pairwise Independent Network , 2016, IEEE Transactions on Information Theory.
[8] George K. Karagiannidis,et al. Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network , 2016, IEEE Transactions on Information Forensics and Security.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[11] I. Csiszár,et al. Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).
[12] Alexander Barg,et al. Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.
[13] Imre Csiszár,et al. Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.
[14] Shuo-Yen Robert Li,et al. Network Coding Theory - Part I: Single Source , 2005, Found. Trends Commun. Inf. Theory.
[15] Lifeng Lai,et al. Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models , 2015, IEEE Transactions on Information Theory.
[16] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[17] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.