Presentation | 2008-02-28 Some Results on Secret Key Agreemet from Correlated Source Outputs Jun MURAMATSU, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We consider the situation in which legitimate users Alice and Bob and an eavesdropper Eve each has access to a correlated source. To transmit messages securely, Alice and Bob must agree on a secret key. Secret key agreement is the procedure for agreeing on a secret key by exchanging messages over a public channel. This paper introduces some results related to secret key agreement. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | secret key agreement / correlated sources / information theoretical security / secret key capacity / low density parity check matrix |
Paper # | IT2007-37,ISEC2007-134,WBS2007-68 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2008/2/21(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Some Results on Secret Key Agreemet from Correlated Source Outputs |
Sub Title (in English) | |
Keyword(1) | secret key agreement |
Keyword(2) | correlated sources |
Keyword(3) | information theoretical security |
Keyword(4) | secret key capacity |
Keyword(5) | low density parity check matrix |
1st Author's Name | Jun MURAMATSU |
1st Author's Affiliation | NTT Communication Science Laboratories, NTT Corporation() |
Date | 2008-02-28 |
Paper # | IT2007-37,ISEC2007-134,WBS2007-68 |
Volume (vol) | vol.107 |
Number (no) | 500 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |