1993
DOI: 10.1109/18.243431
|View full text |Cite
|
Sign up to set email alerts
|

Common randomness in information theory and cryptography. I. Secret sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

19
1,327
1

Year Published

2005
2005
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 1,156 publications
(1,370 citation statements)
references
References 2 publications
19
1,327
1
Order By: Relevance
“…For one-way communication, it is already implied by a result in [3] and has later been shown in [1] that the secret-key rate S → (X; Y |Z) is given by the supremum of H(U |ZV ) − H(U |Y V ), taken over all possible random variables U and V obtained from X. 1 However, as this is a purely information-theoretic result, it does not directly imply that there exists an efficient key-agreement protocol.…”
Section: Secret-key Agreementmentioning
confidence: 97%
See 4 more Smart Citations
“…For one-way communication, it is already implied by a result in [3] and has later been shown in [1] that the secret-key rate S → (X; Y |Z) is given by the supremum of H(U |ZV ) − H(U |Y V ), taken over all possible random variables U and V obtained from X. 1 However, as this is a purely information-theoretic result, it does not directly imply that there exists an efficient key-agreement protocol.…”
Section: Secret-key Agreementmentioning
confidence: 97%
“…As mentioned in the introduction, Theorem 1 has already been known to hold for general (not necessarily efficient) protocols [3,1].…”
Section: A General Expression For the One-way Secret-key Ratementioning
confidence: 99%
See 3 more Smart Citations