Secret Key and Private Key Constructions for Simple Multiterminal Source Models

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Appeared in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4 -

Scientific paper

This work is motivated by recent results of Csiszar and Narayan (IEEE Trans. on Inform. Theory, Dec. 2004), which highlight innate connections between secrecy generation by multiple terminals and multiterminal Slepian-Wolf near-lossless data compression (sans secrecy restrictions). We propose a new approach for constructing secret and private keys based on the long-known Slepian-Wolf code for sources connected by a virtual additive noise channel, due to Wyner (IEEE Trans. on Inform. Theory, Jan. 1974). Explicit procedures for such constructions, and their substantiation, are provided.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Secret Key and Private Key Constructions for Simple Multiterminal Source Models does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Secret Key and Private Key Constructions for Simple Multiterminal Source Models, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret Key and Private Key Constructions for Simple Multiterminal Source Models will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-423262

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.