Common randomness in information theory and cryptography. I. Secret sharing

From MaRDI portal
Publication:4307314

DOI10.1109/18.243431zbMath0802.94013OpenAlexW2108777864MaRDI QIDQ4307314

Imre Csiszár

Publication date: 4 October 1994

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/18.243431




Related Items (28)

Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratioBasics of Secrecy CodingCommon randomness and distributed control: A counterexampleUniversal hierarchical quantum information splitting schemes of an arbitrary multi-qubit stateSecrecy results for compound wiretap channelsComplete characterization of broadcast and pseudo-signatures from correlationsHierarchical quantum information splitting of an arbitrary \(m\)-qudit state with multipartyWhen Are Fuzzy Extractors Possible?Public and private resource trade-offs for a quantum channelOn a connection between information and group latticesComputational Two-Party Correlation: A Dichotomy for Key-Agreement ProtocolsComputing quantum discord is NP-completeAn operational characterization of mutual information in algorithmic information theoryInformation Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR AntennaGeneral theory of information transfer: UpdatedArbitrarily small amounts of correlation for arbitrarily varying quantum channelsStrong Secrecy for Multiple Access ChannelsCapacity Results for Arbitrarily Varying Wiretap ChannelsOn Oblivious Transfer CapacityTHE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENTQuantum communication in Rindler spacetimeUnnamed ItemA joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakageDimension Reduction for Polynomials over Gaussian Space and ApplicationsPrecise evaluation of leaked information with secure randomness extraction in the presence of quantum attackerDistillation of secret-key from a class of compound memoryless quantum sourcesQuantum Information Channels in Curved SpacetimeQuantum privacy and quantum wiretap channels




This page was built for publication: Common randomness in information theory and cryptography. I. Secret sharing