Simultaneous Secrecy and Reliability Amplification for a General Channel Model
暂无分享,去创建一个
Bruce M. Kapron | Russell Impagliazzo | Stefano Tessaro | Valentine Kabanets | Valerie King | Ragesh Jaiswal | B. M. Kapron | Stefano Tessaro | R. Impagliazzo | Valentine Kabanets | Ragesh Jaiswal | Valerie King
[1] Krzysztof Pietrzak,et al. Parallel Repetition of Computationally Sound Protocols Revisited , 2010, Journal of Cryptology.
[2] Yevgeniy Dodis,et al. Shannon Impossibility, Revisited , 2012, ICITS.
[3] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[4] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[5] Junji Shikata. Formalization of information-theoretic security for key agreement, revisited , 2013, 2013 IEEE International Symposium on Information Theory.
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[8] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[9] Ueli Maurer,et al. Perfect cryptographic security from partially independent channels , 1991, STOC '91.
[10] C. Crepeau,et al. "Efficient cryptographic protocols based on noisy channels," Advances in Cryptology-EUROCRYPT'97 , 1997 .
[11] Thomas Holenstein,et al. One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption , 2005, CRYPTO.
[12] Ueli Maurer,et al. Constructive Cryptography - A New Paradigm for Security Definitions and Proofs , 2011, TOSCA.
[13] Mitsugu Iwamoto,et al. Security notions for information theoretically secure encryptions , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[14] Jürg Wullschleger. Oblivious-transfer amplification , 2007, Ausgezeichnete Informatikdissertationen.
[15] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[16] Claude Crépeau,et al. Efficient Cryptographic Protocols Based on Noisy Channels , 1997, EUROCRYPT.
[17] Iftach Haitner. A Parallel Repetition Theorem for Any Interactive Argument , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[18] Joe Kilian,et al. Achieving oblivious transfer using weakened security assumptions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[19] Stefano Tessaro,et al. Amplification of Chosen-Ciphertext Security , 2013, EUROCRYPT.
[20] Rafail Ostrovsky,et al. Constant-Rate Oblivious Transfer from Noisy Channels , 2011, CRYPTO.
[21] Amit Sahai,et al. A complete promise problem for statistical zero-knowledge , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[22] Ueli Maurer,et al. Abstract Cryptography , 2011, ICS.
[23] Rafael Pass,et al. An Efficient Parallel Repetition Theorem , 2010, TCC.
[24] Jürg Wullschleger. Oblivious Transfer from Weak Noisy Channels , 2009, TCC.
[25] Grant Schoenebeck,et al. General Hardness Amplification of Predicates and Puzzles - (Extended Abstract) , 2011, TCC.
[26] Thomas Holenstein,et al. Key agreement from weak bit agreement , 2005, STOC '05.
[27] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[28] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[29] Rafael Pass,et al. An efficient parallel repetition theorem for Arthur-Merlin games , 2007, STOC '07.
[30] Moni Naor,et al. Does parallel repetition lower the error in computationally sound protocols? , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[31] Kai-Min Chung,et al. Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence , 2015 .
[32] Kirill Morozov,et al. Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel , 2004, SCN.
[33] Rafail Ostrovsky,et al. Cryptography with One-Way Communication , 2014, CRYPTO.
[34] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[35] Shai Halevi,et al. Degradation and Amplification of Computational Hardness , 2008, TCC.
[36] Junji Shikata,et al. Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography , 2014, IEEE Transactions on Information Theory.
[37] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[38] Moni Naor,et al. Immunizing Encryption Schemes from Decryption Errors , 2004, EUROCRYPT.
[39] Feng-Hao Liu,et al. Parallel Repetition Theorems for Interactive Arguments , 2010, TCC.
[40] Ueli Maurer,et al. Information-Theoretic Cryptography , 1999, CRYPTO.