Characterization of optimal key set protocols
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a common one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by the so-called key set protocols. In this paper, we give a necessary and suf...
Saved in:
Published in: | Discrete Applied Mathematics Vol. 131; no. 1; pp. 213 - 236 |
---|---|
Main Authors: | , , |
Format: | Journal Article Conference Proceeding |
Language: | English |
Published: |
Lausanne
Elsevier B.V
06-09-2003
Amsterdam Elsevier New York, NY |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a common one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by the so-called key set protocols. In this paper, we give a necessary and sufficient condition for a key set protocol to be “optimal”, that is, to succeed always in sharing a one-bit secret key. |
---|---|
ISSN: | 0166-218X 1872-6771 |
DOI: | 10.1016/S0166-218X(02)00426-2 |