Tight exponential evaluation for universal composablity with privacy amplification and its applications

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Several errors are fixed. The title is slightly changed. The topic and protocol are similar to those in arXiv:0904.0308. Howev

Scientific paper

We adopt the universal composablity as Eve's distinguishability in secret key generation from a common random number between two distinct players without communication. Under this secrecy criterion, using the Renyi entropy of order 1+s for s in [0,1], we derive a new upper bound of Eve's distinguishability under the application of the universal2 hash functions. It is also shown that this bound gives the tight exponential rate of decrease in the case of independent and identical distributions. The result is applied to the wire-tap channel model and to secret key generation (distillation) by public discussion.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Tight exponential evaluation for universal composablity with privacy amplification and its applications does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Tight exponential evaluation for universal composablity with privacy amplification and its applications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tight exponential evaluation for universal composablity with privacy amplification and its applications will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-509027

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.