On the Optimality of Secret Key Agreement via Omniscience
暂无分享,去创建一个
[1] Chung Chan,et al. On Tightness of Mutual Dependence Upperbound for Secret-key Capacity of Multiple Terminals , 2008, ArXiv.
[2] Thomas A. Courtade,et al. Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.
[3] Chung Chan. Compressed Secret Key Agreement: Maximizing Multivariate Mutual Information per Bit , 2017, Entropy.
[4] Yingbin Liang,et al. Secret key capacity: Talk or keep silent? , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[5] Aaron D. Wyner,et al. The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.
[6] Mokshay M. Madiman,et al. Information Inequalities for Joint Distributions, With Interpretations and Applications , 2008, IEEE Transactions on Information Theory.
[7] Chung Chan,et al. Secret key agreement under discussion rate constraints , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[8] Chung Chan,et al. The hidden flow of information , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[9] Himanshu Tyagi,et al. Common Information and Secret Key Capacity , 2013, IEEE Transactions on Information Theory.
[10] Chung Chan,et al. Multivariate Mutual Information Inspired by Secret-Key Agreement , 2015, Proceedings of the IEEE.
[11] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .
[12] Wei Liu,et al. The common information of N dependent random variables , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[13] Raymond W. Yeung,et al. Information Theory and Network Coding , 2008 .
[14] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[15] Chung Chan,et al. Clustering by multivariate mutual information under Chow-Liu tree approximation , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[16] Navin Kashyap,et al. Achieving SK capacity in the source model: When must all terminals talk? , 2014, 2014 IEEE International Symposium on Information Theory.
[17] Navin Kashyap,et al. The communication complexity of achieving SK capacity in a class of PIN models , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[18] Kannan Ramchandran,et al. Deterministic algorithm for the cooperative data exchange problem , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[19] Alexander Sprintson,et al. On coding for cooperative data exchange , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).
[20] Swanand Kadhe,et al. Successive omniscience , 2015, 2015 International Symposium on Network Coding (NetCod).
[21] Chung Chan,et al. When is omniscience a rate-optimal strategy for achieving secret key capacity? , 2016, 2016 IEEE Information Theory Workshop (ITW).
[22] Tie Liu,et al. A marginal characterization of entropy functions for conditional mutually independent random variables (with application to Wyner's common information) , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[23] Raymond W. Yeung,et al. A new outlook of Shannon's information measures , 1991, IEEE Trans. Inf. Theory.
[24] Venkat Anantharam,et al. Information-Theoretic Key Agreement of Multiple Terminals—Part I , 2010, IEEE Transactions on Information Theory.
[25] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.
[26] Chung Chan,et al. Info-Clustering: A Mathematical Theory for Data Clustering , 2016, IEEE Transactions on Molecular, Biological and Multi-Scale Communications.
[27] Imre Csiszár,et al. Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .
[28] Te Sun Han,et al. Linear Dependence Structure of the Entropy Space , 1975, Inf. Control..
[29] Chung Chan,et al. Bounds on the communication rate needed to achieve SK capacity in the hypergraphical source model , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[30] Chung Chan,et al. Mutual dependence for secret key agreement , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[31] Navin Kashyap,et al. On the Public Communication Needed to Achieve SK Capacity in the Multiterminal Source Model , 2015, IEEE Transactions on Information Theory.
[32] Chung Chan,et al. Change of Multivariate Mutual Information: From Local to Global , 2018, IEEE Transactions on Information Theory.
[33] Chung Chan,et al. Duality between feature selection and data clustering , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[34] Chung Chan,et al. Incremental and decremental secret key agreement , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[35] Prakash Narayan,et al. Perfect Omniscience, Perfect Secrecy, and Steiner Tree Packing , 2010, IEEE Transactions on Information Theory.
[36] Satoru Fujishige,et al. Polymatroidal Dependence Structure of a Set of Random Variables , 1978, Inf. Control..
[37] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[38] Imre Csiszár,et al. Secrecy Capacities for Multiterminal Channel Models , 2005, IEEE Transactions on Information Theory.
[39] Alexander Barg,et al. Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.
[40] Imre Csiszár,et al. Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.
[41] Chung Chan,et al. Generating secret in a network , 2010 .