Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Codes and cryptography
Probabilistic quantifiers and games
Journal of Computer and System Sciences - Structure in Complexity Theory Conference, June 2-5, 1986
Perfect cryptographic security from partially independent channels
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
Practical Quantum Oblivious Transfer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
On Deniability in Quantum Key Exchange
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Unconditional Security in Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
A Practical Protocol for Advantage Distillation and Information Reconciliation
Designs, Codes and Cryptography
Correcting errors without leaking partial information
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
An introduction to quantum cryptography
Crossroads
On the (im)possibility of non-interactive correlation distillation
Theoretical Computer Science
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Security Bounds for Quantum Cryptography with Finite Resources
Theory of Quantum Computation, Communication, and Cryptography
Efficient reconciliation protocol for discrete-variable quantum key distribution
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Strongly secure privacy amplification cannot be obtained by encoder of Slepian-Wolf code
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Information-theoretic key agreement: from weak to strong secrecy for free
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Key extraction from general nondiscrete signals
IEEE Transactions on Information Forensics and Security
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Proceedings of the 3rd international conference on Security of information and networks
Privacy amplification with social networks
Proceedings of the 15th international conference on Security protocols
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Information reconciliation for quantum key distribution
Quantum Information & Computation
Auto-adaptive interval selection algorithm for quantum key distribution
Quantum Information & Computation
Simple and tight bounds for information reconciliation and privacy amplification
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Error correction in the bounded storage model
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Efficient device-independent quantum key distribution
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
An empirical analysis of the cascade error reconciliation protocol for quantum key distribution
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A real-time privacy amplification scheme in quantum key distribution
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Quantum Information & Computation
Multi-user wireless channel probing for shared key generation with a fuzzy controller
Computer Networks: The International Journal of Computer and Telecommunications Networking
A multiparty error-correcting method for quantum secret sharing
Quantum Information Processing
Introduction to Special Issue on quantum cryptography
Quantum Information Processing
High performance error correction for quantum key distribution using polar codes
Quantum Information & Computation
Hi-index | 0.00 |
Assuming that Alice and Bob use a secret noisy channel (modelled by a binary symmetric channel) to send a key, reconciliation is the process of correcting errors between Alice's and Bob's version of the key. This is done by public discussion, which leaks some information about the secret key to an eavesdropper. We show how to construct protocols that leak a minimum amount of information. However this construction cannot be implemented efficiently. If Alice and Bob are willing to reveal an arbitrarily small amount of additional information (beyond the minimum) then they can implement polynomial-time protocols. We also present a more efficient protocol, which leaks an amount of information acceptably close to the minimum possible for sufficiently reliable secret channels (those with probability of any symbol being transmitted incorrectly as large as 15%). This work improves on earlier reconciliation approaches [R, BBR, BBBSS].