Perfect Cryptographic Security from Partially Independent Channels

Abstract

Several protocols are presented that allow two parties Alice and Bob not sharing any secret information initially (except possibly a short key to be used for authentication) to generate a long shared secret key such that even an enemy Eve with unlimited computing power is unable to obtain a non-negligible amount of information (in Shannon’s sense) about… (More)
DOI: 10.1145/103418.103476

Topics

1 Figure or Table

Cite this paper

@inproceedings{Maurer1991PerfectCS, title={Perfect Cryptographic Security from Partially Independent Channels}, author={Ueli Maurer}, booktitle={STOC}, year={1991} }