Sciweavers

100 search results - page 18 / 20
» Alice and Bob
Sort
View
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 5 months ago
Key Distillation and the Secret-Bit Fraction
We consider distillation of secret bits from partially secret noisy correlations PABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario...
Nick S. Jones, Lluis Masanes
CORR
1999
Springer
138views Education» more  CORR 1999»
13 years 5 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo
ICASSP
2011
IEEE
12 years 9 months ago
Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive fi
This paper considers the problem of lter design with secrecy constraints, where two legitimate parties (Alice and Bob) communicate in the presence of an eavesdropper (Eve), over a...
Hugo Reboredo, Vinay Uday Prabhu, Miguel R. D. Rod...
INFOCOM
2009
IEEE
14 years 13 days ago
Cooperative Network Coding-Aware Routing for Multi-Rate Wireless Networks
—Recent research has proven that network coding has great potential to improve network throughput in wireless networks. To fully exploit the performance gain brought by network c...
Jin Zhang, Qian Zhang
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
13 years 7 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen