期刊文献+

一种新的信息协调协议 被引量:2

A new information reconciliation protocol
下载PDF
导出
摘要 把比特串逐段视为一个二进制数并对此数定义一种位和运算,通过比较比特串对应段的二进制数位和的不同来纠正比特串中的错误比特,从而完成信息协调.该协议即使在最坏的情况下也要比已有的信息协调协议的效率高,而且泄漏的信息量也较少. The substrings of a bit-string can be regarded as binary numbers on which a digit-sum operation is defined. By comparing the digit-sums of the two substrings, one can locate and correct the error in his substring. The efficiency of our new protocol is much higher than those of all known information reconciliation protocols even in the worst case, and simultaneously, its information leakage is relatively small.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2006年第3期486-490,共5页 Journal of Xidian University
基金 国家自然科学基金资助项目(69972034 60132030) 国家863计划资助项目(2002AA144010) 国家自然科学基金资助项目(60473029)
关键词 无条件安全 密钥协商 信息协调 位和 unconditional security secret-key agreement information reconciliation digit-sum
  • 相关文献

参考文献1

共引文献4

同被引文献38

  • 1Maurer U. Information-theoretic cryptography[C]//Advances in Cryptology CRYPTO'99. LNCS 1666. Berlin: Springer-Verlag, 1999:47-64.
  • 2Shannon C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949,28: 656-715.
  • 3Zhao Yi-bo, Gui You-zhen, Chen Jin-jian, et al. Computational complexity of continuous variable quantum key distribution[J]. IEEE Trans. on Information Theory, 2008,54 (6) : 2803-2807.
  • 4Maurer U. Secret key agreement by public discussion from common information[J]. IEEE Trans. on Information Theory, 1993, 39(3) : 733-742.
  • 5Maurer U. Information - theoretically secure secret - key agree - ment by not authenticated public discussion[C] // Advances in Cryptology-EUROCRYPT' 97. LNCS 1233. Berlin: Springer- Verlag, 1997:209-225.
  • 6Jones N S, Masanes L. Key distillation and the secret-bit fraction [J].IEEE Trans. on Information Theory, 2008,54(2): 680-691.
  • 7Maurer U. Protocols for secret key agreement based on common information[C]// Advances in Cryptology-CRYPTO' 92. LNCS 740. Berlin: Springer-Verlag, 1993 : 461-470.
  • 8Yan Hao, Ren Tienan,Peng Xiang, et al. Information reconciliation protocol in quantum key distribution system EC]//The Fourth International Conference on Natural Computation-ICNC'08. Jinan,China,Oet. 2008,3.-637-641.
  • 9Watanabe Y. Privacy amplification for quantum key distribution [J]. Journal of Physics A: Mathematical and Theoretical, 2007, 40(3) :99-104.
  • 10Liu Shengli, Wang Yumin. Privacy amplification against active attacks with strong robustness[J]. Electron. Lett. , 1999, 35 (9) : 712-713.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部