Characterization of optimal key set protocols

Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a common one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by the so-called key set protocols. In this paper, we give a necessary and suf...

Full description

Saved in:
Bibliographic Details
Published in:Discrete Applied Mathematics Vol. 131; no. 1; pp. 213 - 236
Main Authors: Mizuki, Takaaki, Shizuya, Hiroki, Nishizeki, Takao
Format: Journal Article Conference Proceeding
Language:English
Published: Lausanne Elsevier B.V 06-09-2003
Amsterdam Elsevier
New York, NY
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a common one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by the so-called key set protocols. In this paper, we give a necessary and sufficient condition for a key set protocol to be “optimal”, that is, to succeed always in sharing a one-bit secret key.
ISSN:0166-218X
1872-6771
DOI:10.1016/S0166-218X(02)00426-2