首页> 外文会议>2012 IEEE Information Theory Workshop. >Privacy amplification theorem for bounded storage eavesdropper
【24h】

Privacy amplification theorem for bounded storage eavesdropper

机译:有界存储窃听者的隐私放大定理

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we consider a situation such that legitimate parties, Alice and Bob, share an identical source to generate a secret key, and an eavesdropper, Eve, can access a correlated data that is stored in a storage with bounded size. Then, Alice and Bob want to extract a secret as long as possible. We show a privacy amplification theorem for this problem, i.e., we clarify the rate of key generation for given rate of Eve's storage. The problem can be regarded as a dual randomness generation problem of the Wyner-Ahlswede-Körner type source coding system, and the techniques used in the proof are exchanged, i.e., the so-called Markov lemma is used in the converse part, and the so-called image size characterization is used in the direct part.
机译:在本文中,我们考虑了这样一种情况,合法方Alice和Bob共享一个相同的源来生成密钥,而窃听者Eve可以访问存储在有限大小的存储中的相关数据。然后,爱丽丝和鲍勃希望尽可能长地提取秘密。我们针对该问题展示了一个隐私放大定理,即,对于给定的夏娃存储速率,我们阐明了密钥生成的速率。该问题可视为Wyner-Ahlswede-Körner类型源编码系统的双重随机性生成问题,并且交换了证明中使用的技术,即,在相反的部分中使用了所谓的马尔可夫引理,在直接部分中使用所谓的图像尺寸表征。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号