Common randomness in information theory and cryptography. I. Secret sharing
From MaRDI portal
Publication:4307314
DOI10.1109/18.243431zbMath0802.94013OpenAlexW2108777864MaRDI QIDQ4307314
Publication date: 4 October 1994
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/18.243431
Related Items (28)
Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio ⋮ Basics of Secrecy Coding ⋮ Common randomness and distributed control: A counterexample ⋮ Universal hierarchical quantum information splitting schemes of an arbitrary multi-qubit state ⋮ Secrecy results for compound wiretap channels ⋮ Complete characterization of broadcast and pseudo-signatures from correlations ⋮ Hierarchical quantum information splitting of an arbitrary \(m\)-qudit state with multiparty ⋮ When Are Fuzzy Extractors Possible? ⋮ Public and private resource trade-offs for a quantum channel ⋮ On a connection between information and group lattices ⋮ Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols ⋮ Computing quantum discord is NP-complete ⋮ An operational characterization of mutual information in algorithmic information theory ⋮ Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna ⋮ General theory of information transfer: Updated ⋮ Arbitrarily small amounts of correlation for arbitrarily varying quantum channels ⋮ Strong Secrecy for Multiple Access Channels ⋮ Capacity Results for Arbitrarily Varying Wiretap Channels ⋮ On Oblivious Transfer Capacity ⋮ THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT ⋮ Quantum communication in Rindler spacetime ⋮ Unnamed Item ⋮ A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage ⋮ Dimension Reduction for Polynomials over Gaussian Space and Applications ⋮ Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker ⋮ Distillation of secret-key from a class of compound memoryless quantum sources ⋮ Quantum Information Channels in Curved Spacetime ⋮ Quantum privacy and quantum wiretap channels
This page was built for publication: Common randomness in information theory and cryptography. I. Secret sharing