Show simple item record

dc.contributor.author
Renner, Renato
dc.contributor.author
Wolf, Stefan
dc.contributor.editor
Biham, Eli
dc.date.accessioned
2024-08-26T14:58:05Z
dc.date.available
2017-06-10T08:31:11Z
dc.date.available
2024-08-26T14:58:05Z
dc.date.issued
2003
dc.identifier.isbn
3-540-14039-5
en_US
dc.identifier.isbn
978-3-540-14039-9
en_US
dc.identifier.isbn
978-3-540-39200-2
en_US
dc.identifier.issn
0302-9743
dc.identifier.issn
1611-3349
dc.identifier.other
10.1007/3-540-39200-9_35
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/55141
dc.description.abstract
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the extraction of information-theoretically secret bits. The best known upper bound on the rate S at which such key bits can be generated has been the intrinsic information of the distribution modeling the parties’, including the adversary’s, knowledge. Based on a new property of the secret-key rate S, we introduce a conditional mutual information measure which is a stronger upper bound on S. Having thus seen that the intrinsic information of a distribution P is not always suitable for determining the number of secret bits extractable from P, we prove a different significance of it in the same context: It is a lower bound on the number of key bits required to generate P by public communication. Taken together, these two results imply that sometimes, (a possibly arbitrarily large fraction of) the correlation contained in distributed information cannot be extracted in the form of secret keys by any protocol.
en_US
dc.language.iso
en
en_US
dc.publisher
Springer
en_US
dc.subject
Information-theoretic security
en_US
dc.subject
Secret-key agreement
en_US
dc.subject
Reductions among primitives
en_US
dc.subject
Information measures
en_US
dc.subject
Quantum entanglement purification
en_US
dc.title
New bounds in secret-key agreement: The gap between formation and secrecy extraction
en_US
dc.type
Conference Paper
dc.date.published
2003-05-13
ethz.book.title
Advances in Cryptology – EUROCRYPT 2003
en_US
ethz.journal.title
Lecture Notes in Computer Science
ethz.journal.volume
2656
en_US
ethz.journal.abbreviated
LNCS
ethz.pages.start
562
en_US
ethz.pages.end
577
en_US
ethz.event
International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT 2003)
en_US
ethz.event.location
Warsaw, Poland
en_US
ethz.event.date
May 4-8, 2003
en_US
ethz.identifier.wos
ethz.publication.place
Berlin
en_US
ethz.publication.status
published
en_US
ethz.date.deposited
2017-06-10T08:33:07Z
ethz.source
ECIT
ethz.identifier.importid
imp59364fb7789af27557
ethz.ecitpid
pub:88824
ethz.eth
yes
en_US
ethz.availability
Metadata only
en_US
dc.relation.isnodouble
55110
*
dc.relation.isnodouble
55109
*
ethz.rosetta.installDate
2017-07-18T08:00:39Z
ethz.rosetta.lastUpdated
2024-02-01T19:15:06Z
ethz.rosetta.exportRequired
true
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=New%20bounds%20in%20secret-key%20agreement:%20The%20gap%20between%20formation%20and%20secrecy%20extraction&rft.jtitle=Lecture%20Notes%20in%20Computer%20Science&rft.date=2003&rft.volume=2656&rft.spage=562&rft.epage=577&rft.issn=0302-9743&1611-3349&rft.au=Renner,%20Renato&Wolf,%20Stefan&rft.isbn=3-540-14039-5&978-3-540-14039-9&978-3-540-39200-2&rft.genre=proceeding&rft_id=info:doi/10.1007/3-540-39200-9_35&rft.btitle=Advances%20in%20Cryptology%20%E2%80%93%20EUROCRYPT%202003
 Search print copy at ETH Library

Files in this item

FilesSizeFormatOpen in viewer

There are no files associated with this item.

Publication type

Show simple item record