Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression
暂无分享,去创建一个
[1] Renato Renner,et al. Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement , 2007, ICITS.
[2] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[3] W. Marsden. I and J , 2012 .
[4] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[5] R. A. McDonald,et al. Noiseless Coding of Correlated Information Sources , 1973 .
[6] Jun Muramatsu,et al. On the problem of generating mutually independent random sequences , 2002, Proceedings IEEE International Symposium on Information Theory,.
[7] Hugo Krawczyk,et al. On Compression of Data Encrypted With Block Ciphers , 2012, IEEE Transactions on Information Theory.
[8] Moritz Wiese,et al. Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages , 2013, IEEE Transactions on Information Forensics and Security.
[9] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[10] Yasutada Oohama. On a Relationship between the Correct Probability of Estimation from Correlated Data and Mutual Information , 2018, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] Imre Csiszár. Linear codes for sources and source networks: Error exponents, universal coding , 1982, IEEE Trans. Inf. Theory.
[12] Yasutada Oohama. Intrinsic Randomness Problem in the Framework of Slepian-Wolf Separate Coding System , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[13] Te Sun Han,et al. Universal coding for the Slepian-Wolf data compression system and the strong converse theorem , 1994, IEEE Trans. Inf. Theory.
[14] Bagus Santoso,et al. Privacy amplification of distributed encrypted sources with correlated keys , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[15] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[16] János Körner,et al. How to encode the modulo-two sum of binary sources (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[17] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .