2010
DOI: 10.1109/tit.2010.2050832
|View full text |Cite
|
Sign up to set email alerts
|

Information-Theoretic Key Agreement of Multiple Terminals—Part I

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

3
122
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(125 citation statements)
references
References 17 publications
3
122
0
Order By: Relevance
“…2) or by investigating upper bounds other than E sq (N ). For this last question, some recent results in classical information theory 48,49 might be helpful.…”
Section: Discussionmentioning
confidence: 99%
“…2) or by investigating upper bounds other than E sq (N ). For this last question, some recent results in classical information theory 48,49 might be helpful.…”
Section: Discussionmentioning
confidence: 99%
“…A single-letter characterization of WSK capacity remains unresolved in general (cf. [10]). The sufficiency of the previous necessary condition is unclear even when WSK capacity is known.…”
Section: Discussionmentioning
confidence: 99%
“…From [15], [1] (and also Theorem 1), , where . Since , by Theorem 2 is securely computable if (10) We give a simple scheme for the secure computation of when , that relies on Wyner's well-known method for Slepian-Wolf data compression [20] and a derived SK generation scheme in [23], [24], and [22]. When , we can write (11) with being independent separately of and .…”
Section: Example 1: Letmentioning
confidence: 99%
“…Among them, information reconciliation processes are proposed in order to solve many problems in cryptography and security issues [7,8,9,11,12,13,14,15,16]. In this problem, it is assumed that Alice and Bob want to share a secret key by generating random numbers from a correlated source with noise, instead of securely transferring from Alice to Bob.…”
Section: Related Workmentioning
confidence: 99%