期刊文献+

公开协商所提取的无条件安全秘密钥长度 被引量:5

Length of the unconditionally secure secret key distilled by public discussion
下载PDF
导出
摘要 讨论了在公共信道上利用无条件安全秘密钥协商协议来公开协商提取秘密钥,并借助于UniversalHash函数和Rényi熵阐明了所提取的密钥长度与协议中的信息协商和保密增强的关系. This paper discusses how to distill the secret key by public discussion using unconditionally secure secret key agreement protocols. The relation between the length of the distilled secret key and the information reconciliation & privacy amplification in the protocol is shown with the help of Universal Hash and Rényi entropy.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 1999年第4期436-439,共4页 Journal of Xidian University
关键词 无条件安全 信息协商 保密增强 密钥协商 unconditionally secure information reconciliation privacy amplification Rényi entropy secret key agreement
  • 相关文献

同被引文献28

  • 1Shannon C E.Communication Theory of Secrecy Systems[J].Bell System Technieal Journal,1949,28(4):656-715.
  • 2Massey J L.Contemporary Cryptography:an Introduction[A].Contemporary Cryptology:the Science of Information Integrity[C].New York:IEEE Press,1991:1-39.
  • 3Bennett C H,Brassard G,Ekert AK.Quantum Cryptography[J].seientic American,1992,267(4):50-57.
  • 4Bennett C H,Brassard G,Robert J M.Privacy Amplification by Public Discussion[J].SIAN Journal on Computing,1988,17(2):210-219.
  • 5Wyner A D.The Wire-tap Channel[J].Bell SystemTechnical Journal,1975,54(8):656-715.
  • 6Yao A.Protocols of forSecure Computation[Al.Proc 23rd IEEESymposium on Foundations of Computerscience (FOCS 82)[C].New York:IEEE Computer Security,1982.160-164.
  • 7Yao A.Howto Generate and Exchange Secrets[A].Proc 27th IEEE Symposium on Foundations of Computer Science(FOCS 86)[C].NewYork:IEEE Computer Security,1986.162-167.
  • 8Fischlin M.A Cost-effective Pay-per-multiplication Comparison Method for Millionaires[DB/OL] 'http://www.mi.informatik.unifrankfurt.de/research/papers.html,2001-04-01.
  • 9Shannon C E.Communication Theory of Secrecy Systems[J].Bell SystemTechnical Journal,1949,28(4):656-715.
  • 10Massey J L.Contemporary Cryptography:an Introduction[C] //Contemporary Cryptology:the Science of Information Integrity.New York:IEEE Press,1991:1-39.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部