A Simple and Efficiently Verifiable Characterization of the Possibility of Information-Theoretic Key Agreement Secure against Active Adversaries

نویسنده

  • Stefan Wolf
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret-key agreement over unauthenticated public channels II: the simulatability condition

This is the second part of a three-part paper on secret-key agreement secure against active adversaries. In the first part, we showed that when two parties, willing to generate a secret key, but connected only by a completely insecure communication channel, have access to independent repetitions of some random experiment, then the possibility of secret-key agreement depends on a certain propert...

متن کامل

Information-theoretically Secure Secret-key Agreement by Not Authenticated Public Discussion 1

All information-theoretically secure key agreement protocols (e.g. based on quantum cryptography or on noisy channels) described in the literature are secure only against passive adversaries in the sense that they assume the existence of an authenticated public channel. The goal of this paper is to investigate information-theoretic security even against active adversaries with complete control ...

متن کامل

On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries

Noisy channels are a powerful resource for cryptography as they can be used to obtain information-theoretically secure key agreement, commitment and oblivious transfer protocols, among others. Oblivious transfer (OT) is a fundamental primitive since it is complete for secure multiparty computation, and the OT capacity characterizes how efficiently a channel can be used for obtaining string obli...

متن کامل

Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result

This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information X and Y , respectively, can generate a string S about which an adversary, knowing some information Z and having read and write access to the communication channel used by the legitim...

متن کامل

Secret-Key Agreement Over Unauthenticated Public Channels—Part I: Definitions and a Completeness Result

This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information and , respectively, can generate a string about which an adversary, knowing some information and having read and write access to the communication channel used by the legitimate part...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000