Abstract
Aultmore and Balvenie want to agree on a common secret key. They have at their disposal a noisy channel and an error free public channel. The situation is complicated by an adversary, Ellen, who eavesdrops the noisy channel and the public channel. Fortunately for Aultmore and Balvenie, the eavesdropping channel is noisy as well. This will enable them to generate a secret key. In the literature, this is done in three phases; the advantage distillation phase, the information reconciliation phase, and the privacy amplification phase. We show that the first two phases are based on the same concept and that presently known techniques used in both phases are basically special cases of a more general technique.
Original language | English |
---|---|
Title of host publication | 1998 Information Theory Workshop, ITW 1998 |
Publisher | Institute of Electrical and Electronics Engineers |
Pages | 158-159 |
Number of pages | 2 |
ISBN (Electronic) | 0780344081, 9780780344082 |
DOIs | |
Publication status | Published - 1998 |
Event | 1998 IEEE Information Theory Workshop (ITW 1998) - Killarney, Ireland Duration: 22 Jun 1998 → 26 Jun 1998 |
Conference
Conference | 1998 IEEE Information Theory Workshop (ITW 1998) |
---|---|
Abbreviated title | ITW 1998 |
Country/Territory | Ireland |
City | Killarney |
Period | 22/06/98 → 26/06/98 |
Bibliographical note
Publisher Copyright:© 1998 IEEE.