Sciweavers

7 search results - page 1 / 2
» Rate Regions of Secret Key Sharing in a New Source Model
Sort
View
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 4 months ago
Rate Regions of Secret Key Sharing in a New Source Model
A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other si...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...
EUROCRYPT
2003
Springer
13 years 9 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 3 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...
INFOCOM
2011
IEEE
12 years 8 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
TIT
2010
146views Education» more  TIT 2010»
12 years 11 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener