Protocols for Secret Key Agreement by Public Discussion Based on Common Information
- 18 May 2001
- book chapter
- Published by Springer Nature
- p. 461-470
- https://doi.org/10.1007/3-540-48071-4_32
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- How to Reduce your Enemy’s Information (extended abstract)Published by Springer Nature ,2000
- Conditionally-perfect secrecy and a provably-secure randomized cipherJournal of Cryptology, 1992
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Broadcast channels with confidential messagesIEEE Transactions on Information Theory, 1978
- The Wire-Tap ChannelBell System Technical Journal, 1975
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949