The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
프라이버시 증폭이란 추출된 키와 도청자의 랜덤변수가 통계적으로 독립이 되도록 함수에 의해 랜덤변수로부터 비밀키를 추출하는 기술이다. 프라이버시 증폭에 의해 증류된 키에 대한 보안 기준에는 약한 보안 기준이라고도 하는 정규화된 발산 기준, 변형 거리 기준, 강한 보안 기준이라고도 하는 발산 기준의 세 가지 종류가 있습니다. 비밀키를 추출하는 기법으로 Slepian-Wolf(디코더에서 전체 부가 정보를 포함하는 소스 코딩) 코드의 인코더를 약한 보안 기준을 적용하면 프라이버시 증폭 기능으로 사용할 수 있는 것으로 알려져 있습니다. . 본 논문에서는 약한 기준 이외의 기준을 적용하면 Slepian-Wolf 코드의 인코더가 프라이버시 증폭 기능으로 사용될 수 없음을 보여줍니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Shun WATANABE, Ryutaroh MATSUMOTO, Tomohiko UYEMATSU, "Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 9, pp. 1650-1659, September 2010, doi: 10.1587/transfun.E93.A.1650.
Abstract: Privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by privacy amplification: the normalized divergence criterion, which is also known as the weak security criterion, the variational distance criterion, and the divergence criterion, which is also known as the strong security criterion. As a technique to distill a secret key, it is known that the encoder of a Slepian-Wolf (the source coding with full side-information at the decoder) code can be used as a function for privacy amplification if we employ the weak security criterion. In this paper, we show that the encoder of a Slepian-Wolf code cannot be used as a function for privacy amplification if we employ the criteria other than the weak one.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.1650/_p
부
@ARTICLE{e93-a_9_1650,
author={Shun WATANABE, Ryutaroh MATSUMOTO, Tomohiko UYEMATSU, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code},
year={2010},
volume={E93-A},
number={9},
pages={1650-1659},
abstract={Privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by privacy amplification: the normalized divergence criterion, which is also known as the weak security criterion, the variational distance criterion, and the divergence criterion, which is also known as the strong security criterion. As a technique to distill a secret key, it is known that the encoder of a Slepian-Wolf (the source coding with full side-information at the decoder) code can be used as a function for privacy amplification if we employ the weak security criterion. In this paper, we show that the encoder of a Slepian-Wolf code cannot be used as a function for privacy amplification if we employ the criteria other than the weak one.},
keywords={},
doi={10.1587/transfun.E93.A.1650},
ISSN={1745-1337},
month={September},}
부
TY - JOUR
TI - Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1650
EP - 1659
AU - Shun WATANABE
AU - Ryutaroh MATSUMOTO
AU - Tomohiko UYEMATSU
PY - 2010
DO - 10.1587/transfun.E93.A.1650
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 9
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - September 2010
AB - Privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by privacy amplification: the normalized divergence criterion, which is also known as the weak security criterion, the variational distance criterion, and the divergence criterion, which is also known as the strong security criterion. As a technique to distill a secret key, it is known that the encoder of a Slepian-Wolf (the source coding with full side-information at the decoder) code can be used as a function for privacy amplification if we employ the weak security criterion. In this paper, we show that the encoder of a Slepian-Wolf code cannot be used as a function for privacy amplification if we employ the criteria other than the weak one.
ER -