Key Distillation and the Secret-Bit Fraction
نویسندگان
چکیده
منابع مشابه
Quantum cryptography and secret-key distillation
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits the properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book start...
متن کاملAn Efficient Advantage Distillation Scheme for Bidirectional Secret-Key Agreement
Yan Feng 1,† ID , Xue-Qin Jiang 1,∗,†, Jia Hou 2,†, Hui-Ming Wang 3,† and Yi Yang 1,† 1 School of Information Science and technology, Donghua University, Shanghai 201620, China; [email protected] (Y.F.); [email protected] (Y.Y.) 2 School of electronics and information, Soochow University, Soochow 215000, China; [email protected] 3 School of electronic and Information Engineering, Xi’an J...
متن کاملCompressed Secret Key Agreement: Maximizing Multivariate Mutual Information per Bit
The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated components in order to generate a common secret key. The objective is to maximize the achievable key rate as a function of the joint entropy o...
متن کاملDistillation of secret key from a class of compound memoryless quantum sources
We consider secret-key distillation from tripartite compound classical-quantum-quantum (cqq) sources with free forward public communication under strong security criterion. We design protocols which are universally reliable and secure in this scenario. These are shown to achieve asymptotically optimal rates as long as a certain regularity condition is fulfilled by the the set of its generating ...
متن کاملSecret-key Certificates (continued) Secret-key Certiicates (continued)
A new construction is described for designing secret-key certiicate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certiicate issuing protocols that enable the Certiication Authority to certify public keys, without being able to compromise the conndentiality of the corresponding secret keys. Furthermore the design of secure showing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2008
ISSN: 0018-9448
DOI: 10.1109/tit.2007.913264