We consider information theoretic secret key (SK) agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel. Our main result is an upper bound on the SK length, which is derived using a reduction of binary hypothesis testing to multiparty SK agreement. Building on this basic result, we derive new converses for multiparty SK agreement. Furthermore, we derive converse results for the oblivious transfer problem and the bit commitment problem by relating them to SK agreement. Finally, we derive a necessary condition for the feasibility of secure computation by trusted parties that seek to compute a function of their collective data, using an interactive pu...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
One big problem of the communication between two parties is the secrecy. That means how much informa...
Multiple parties observing correlated data seek to recover each other's data and attain omniscience....
Abstract. We consider secret key agreement by multiple parties observ-ing correlated data and commun...
. The problem of generating a shared secret key S by two parties knowing dependent random variables ...
We revisit the problem of secret key agreement using interactive public communication for two partie...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
We revisit the problem of secret key agreement using interactive public communication for two partie...
We revisit the problem of secret key agreement using interactive public communication for two partie...
We derive impossibility (converse) bounds for the efficiency of implementing information theoretical...
Abstract. Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, ...
Two parties observing correlated data seek to exchange their data using interactive communication. H...
The multiterminal secret key agreement problem by public discussion is formulated with an additional...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
We consider a coded cooperative data exchange problem with the goal of generating a secret key. Spec...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
One big problem of the communication between two parties is the secrecy. That means how much informa...
Multiple parties observing correlated data seek to recover each other's data and attain omniscience....
Abstract. We consider secret key agreement by multiple parties observ-ing correlated data and commun...
. The problem of generating a shared secret key S by two parties knowing dependent random variables ...
We revisit the problem of secret key agreement using interactive public communication for two partie...
Abstract—We revisit the problem of secret key agreement in channel models, where in addition to a no...
We revisit the problem of secret key agreement using interactive public communication for two partie...
We revisit the problem of secret key agreement using interactive public communication for two partie...
We derive impossibility (converse) bounds for the efficiency of implementing information theoretical...
Abstract. Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, ...
Two parties observing correlated data seek to exchange their data using interactive communication. H...
The multiterminal secret key agreement problem by public discussion is formulated with an additional...
Information theoretically secure multi-party computation (MPC) has been a central primitive of moder...
We consider a coded cooperative data exchange problem with the goal of generating a secret key. Spec...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
One big problem of the communication between two parties is the secrecy. That means how much informa...
Multiple parties observing correlated data seek to recover each other's data and attain omniscience....