Ampli cation

نویسندگان

  • Charles H. Bennett
  • Gilles Brassard
  • Ueli M. Maurer
چکیده

This paper provides a general treatment of privacy ampliication by public discussion , a concept introduced by Bennett, Brassard and Robert for a special scenario. Privacy ampliication is a protocol that allows two parties to distill a secret key from a common random variable that is only partially secret, i.e. about which an eavesdropper has some partial information , where the two parties generally know nothing about the eavesdropper's information except that it satisses a certain constraint. The results have applications to unconditionally-secure secret-key agreement protocols, quantum cryptography and to a generalized treatment of wire-tap and broadcast channels for a considerably strengthened deenition of secrecy capacity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantitative variation and selection of esterase gene ampli®cation in Culex pipiens

Although descriptions of evolutionary mechanisms are common in the literature, very few studies focus on the possible evolution of the adaptive genes themselves, i.e. their quantitative and qualitative changes. Evolution of insecticide resistance in Culex pipiens is a suitable model for studying such processes. In this species, organophosphorous insecticide resistance can be achieved through th...

متن کامل

Write Amplification Reduction for Flash Memory SSDs

Write ampli€cation is an undesirable phenomenon with ƒash memory based SSDs, which not only reduces endurance of ƒash memory, but also imposes write performance penalty on SSDs. Œis paper discusses how to eliminate or reduce the write ampli€cation of SSD interface presenting ƒash memory as a linear array of updatable sectors so that SSD’s performance and endurance can be both improved greatly. ...

متن کامل

Classical Security Protocols for QKD Systems

The purpose of this report is to document the three principal classes of classic cryptographic protocols which are needed in systems for quantum key distribution. We will detail the protocols used for secret–key reconciliation by public discussion, privacy ampli…cation by public discussion, and unconditionally secure authentication. We suggest the use of the model checking method for the analys...

متن کامل

Quantitative evaluation by minisequencing and microarrays reveals accurate multiplexed SNP genotyping of whole genome ampli®ed DNA

Whole genome ampli®cation (WGA) procedures such as primer extension preampli®cation (PEP) or multiple displacement ampli®cation (MDA) have the potential to provide an unlimited source of DNA for large-scale genetic studies. We have performed a quantitative evaluation of PEP and MDA for genotyping single nucleotide polymorphisms (SNPs) using multiplex, four-color ̄uorescent minisequencing in a m...

متن کامل

Analytical and Experimental Evaluation of Aerodynamic Thrust Vectoring on an Aerospike Nozzle

Results from numerical and coldow experimental investigations of aerodynamic thrust vectoring on a small-scale aerospike thruster are presented. Thrust vectoring was created by the injection of a secondary uid into the primary ow eld normal to the nozzle axis. The experimental aerospike nozzle was truncated at 57% of its full theoretical length. Data derived from coldow thrust vectoring tests w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995