Information theoretic security based on bounded observability

  • Authors:
  • Jun Muramatsu;Kazuyuki Yoshimura;Peter Davis

  • Affiliations:
  • NTT Communication Science Laboratories, NTT Corporation, Kyoto, Japan;NTT Communication Science Laboratories, NTT Corporation, Kyoto, Japan;NTT Communication Science Laboratories, NTT Corporation, Kyoto, Japan

  • Venue:
  • ICITS'09 Proceedings of the 4th international conference on Information theoretic security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Under the condition that all users can observe a common object, each using an observation function independently chosen from the same limited set of observation functions, we show necessary and sufficient conditions for users to be able to generate secret keys by public discussion.