The art of distilling [secret key generation]

M. Van Dijk, H. Van Tilborg

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Abstract

Aultmore and Balvenie want to agree on a common secret key. They have at their disposal a noisy channel and an error free public channel. The situation is complicated by an adversary, Ellen, who eavesdrops the noisy channel and the public channel. Fortunately for Aultmore and Balvenie, the eavesdropping channel is noisy as well. This will enable them to generate a secret key. In the literature, this is done in three phases; the advantage distillation phase, the information reconciliation phase, and the privacy amplification phase. We show that the first two phases are based on the same concept and that presently known techniques used in both phases are basically special cases of a more general technique.

Original languageEnglish
Title of host publication1998 Information Theory Workshop, ITW 1998
PublisherInstitute of Electrical and Electronics Engineers
Pages158-159
Number of pages2
ISBN (Electronic)0780344081, 9780780344082
DOIs
Publication statusPublished - 1998
Event1998 IEEE Information Theory Workshop (ITW 1998) - Killarney, Ireland
Duration: 22 Jun 199826 Jun 1998

Conference

Conference1998 IEEE Information Theory Workshop (ITW 1998)
Abbreviated titleITW 1998
Country/TerritoryIreland
CityKillarney
Period22/06/9826/06/98

Bibliographical note

Publisher Copyright:
© 1998 IEEE.

Fingerprint

Dive into the research topics of 'The art of distilling [secret key generation]'. Together they form a unique fingerprint.

Cite this