A Simple and Efficiently Verifiable Characterization of the Possibility of Information-Theoretic Key Agreement Secure against Active Adversaries
نویسنده
چکیده
منابع مشابه
Secret-key agreement over unauthenticated public channels II: the simulatability condition
This is the second part of a three-part paper on secret-key agreement secure against active adversaries. In the first part, we showed that when two parties, willing to generate a secret key, but connected only by a completely insecure communication channel, have access to independent repetitions of some random experiment, then the possibility of secret-key agreement depends on a certain propert...
متن کاملInformation-theoretically Secure Secret-key Agreement by Not Authenticated Public Discussion 1
All information-theoretically secure key agreement protocols (e.g. based on quantum cryptography or on noisy channels) described in the literature are secure only against passive adversaries in the sense that they assume the existence of an authenticated public channel. The goal of this paper is to investigate information-theoretic security even against active adversaries with complete control ...
متن کاملOn the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Noisy channels are a powerful resource for cryptography as they can be used to obtain information-theoretically secure key agreement, commitment and oblivious transfer protocols, among others. Oblivious transfer (OT) is a fundamental primitive since it is complete for secure multiparty computation, and the OT capacity characterizes how efficiently a channel can be used for obtaining string obli...
متن کاملSecret-key agreement over unauthenticated public channels I: Definitions and a completeness result
This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information X and Y , respectively, can generate a string S about which an adversary, knowing some information Z and having read and write access to the communication channel used by the legitim...
متن کاملSecret-Key Agreement Over Unauthenticated Public Channels—Part I: Definitions and a Completeness Result
This is the first part of a three-part paper on secret-key agreement secure against active adversaries. In all three parts, we address the question whether two parties, knowing some correlated pieces of information and , respectively, can generate a string about which an adversary, knowing some information and having read and write access to the communication channel used by the legitimate part...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000