Sciweavers

93
Voted
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
15 years 12 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein