Information-theoretic key agreement of multiple terminal: part II: channel model
暂无分享,去创建一个
[1] V. Anantharam,et al. An outer bound to the admissible source region of broadcast channels with arbitrarily correlated sources and channel variations , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[2] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[3] Shun Watanabe,et al. Key rate of quantum key distribution with hashed two-way classical communication , 2007, 2007 IEEE International Symposium on Information Theory.
[4] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] Ueli Maurer,et al. Unbreakable Keys from Random Noise , 2007 .
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[9] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[10] Venkat Anantharam,et al. Communication For Omniscience by a Neutral Observer and Information-Theoretic Key Agreement of Multiple Terminals , 2007, 2007 IEEE International Symposium on Information Theory.
[11] Renato Renner,et al. New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction , 2003, EUROCRYPT.
[12] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[13] Ueli Maurer,et al. The intrinsic conditional mutual information and perfect secrecy , 1997, Proceedings of IEEE International Symposium on Information Theory.
[14] S. Wolf,et al. From weak to strong information-theoretic key agreement , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[15] Venkat Anantharam,et al. A generalized cut-set bound , 2009, 2009 IEEE International Symposium on Information Theory.
[16] Imre Csiszár,et al. Secrecy Capacities for Multiterminal Channel Models , 2005, IEEE Transactions on Information Theory.
[17] Imre Csiszár,et al. Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.
[18] Ueli Maurer,et al. Unbreakable Keys from Random Noise; ; ; Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting , 2007 .
[19] Renato Renner,et al. A property of the intrinsic mutual information , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[20] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.