Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes
暂无分享,去创建一个
[1] Aravind Srinivasan,et al. Chernoff-Hoeffding bounds for applications with limited independence , 1995, SODA '93.
[2] Alon Orlitsky,et al. Average-case interactive communication , 1992, IEEE Trans. Inf. Theory.
[3] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[4] Yevgeniy Dodis,et al. Correcting errors without leaking partial information , 2005, STOC '05.
[5] Venkatesan Guruswami,et al. Explicit capacity-achieving list-decodable codes , 2005, STOC.
[6] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[7] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[8] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[9] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[10] Uzi Vishkin,et al. Communication complexity of document exchange , 1999, SODA '00.
[11] Yaron Minsky,et al. Set reconciliation with nearly optimal communication complexity , 2003, IEEE Trans. Inf. Theory.
[12] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[13] J. H. van Lint,et al. Introduction to Coding Theory , 1982 .
[14] Michael Langberg,et al. Private codes or succinct random codes that are (almost) perfect , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[15] Renato Renner,et al. Simple and Tight Bounds for Information Reconciliation and Privacy Amplification , 2005, ASIACRYPT.
[16] Venkatesan Guruswami,et al. List decoding algorithms for certain concatenated codes , 2000, STOC '00.
[17] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[18] Peter Elias,et al. Error-correcting codes for list decoding , 1991, IEEE Trans. Inf. Theory.
[19] Yan Zong Ding,et al. Error Correction in the Bounded Storage Model , 2005, TCC.
[20] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[21] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[22] Venkatesan Guruswami,et al. Combinatorial bounds for list decoding , 2002, IEEE Trans. Inf. Theory.
[23] Moni Naor,et al. Derandomized Constructions of k-Wise (Almost) Independent Permutations , 2005, Algorithmica.
[24] Henning Stichtenoth,et al. Algebraic function fields and codes , 1993, Universitext.
[25] G. David Forney,et al. Concatenated codes , 2009, Scholarpedia.
[26] Richard J. Lipton,et al. A New Approach To Information Theory , 1994, STACS.
[27] Silvio Micali,et al. Optimal Error Correction Against Computationally Bounded Noise , 2005, TCC.
[28] Renato Renner,et al. The Exact Price for Unconditionally Secure Asymmetric Cryptography , 2004, EUROCRYPT.
[29] Alon Orlitsky. Interactive Communication of Balanced Distributions and of Correlated Files , 1993, SIAM J. Discret. Math..
[30] Venkatesan Guruswami. List decoding with side information , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..
[31] Alon Orlitsky,et al. Worst-case interactive communication I: Two messages are almost optimal , 1990, IEEE Trans. Inf. Theory.
[32] Ronen Shaltiel,et al. Constant-Round Oblivious Transfer in the Bounded Storage Model , 2004, Journal of Cryptology.