搜索结果: 1-5 共查到“军队指挥学 privacy amplification”相关记录5条 . 查询时间(0.046 秒)
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Privacy Amplification Non-malleable extractors Quantum Cryptography
font style='font-size:12px;'>
2019/3/1
privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret X in order to establish a shared private key K by exchanging messages over an insecure commun...
Privacy Amplification from Non-malleable Codes
Non-malleability Privacy Amplification Information-theoretic Key Agreement
font style='font-size:12px;'>
2018/3/29
In this paper, we connect two interesting problems in the domain of Information-Theoretic Cryptography: "Non-malleable Codes" and "Privacy Amplification". Non-malleable codes allow for encoding a mess...
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
privacy amplification non-malleable extractor
font style='font-size:12px;'>
2016/1/5
Recently, the problem of privacy amplification with an active adversary has received a lot of attention. Given a shared n-bit weak random source X with min-entropy k and a security parameter s, the ma...
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification
Affine-malleable Extractors Spectrum Doubling
font style='font-size:12px;'>
2015/12/21
The study of seeded randomness extractors is a major line of research in theoretical computer
science. The goal is to construct deterministic algorithms which can take a “weak” random
source X with ...
Amplifying Privacy in Privacy Amplification
Source Privacy BRM Optimal Entropy Loss
font style='font-size:12px;'>
2014/3/6
We study the classical problem of privacy amplification, where two parties Alice and Bob share a weak secret $X$ of min-entropy $k$, and wish to agree on secret key $R$ of length $m$ over a public com...