[LLIBRE][B] Information-theoretic Cryptography

H Tyagi, S Watanabe - 2023 - books.google.com
This book offers a mathematical foundation for modern cryptography. It is primarily intended
as an introduction for graduate students. Readers should have basic knowledge of …

Coding for positive rate in the source model key agreement problem

A Gohari, O Günlü, G Kramer - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
A two-party key agreement problem with public discussion, known as the source model
problem, is considered. By relating key agreement to hypothesis testing, a new coding …

Upper bounds via lamination on the constrained secrecy capacity of hypergraphical sources

C Chan, M Mukherjee, N Kashyap… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Hypergraphical sources are a natural class of sources for secret key generation, within
which different subsets of terminals sharing secrets are allowed to discuss publicly in order …

Optimal rate-limited secret key generation from Gaussian sources using lattices

L Luzzi, C Ling, MR Bloch - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
We propose a lattice-based scheme for secret key generation from Gaussian sources in the
presence of an eavesdropper, and show that it achieves the strong secret key capacity in the …

Wiretap secret key capacity of Tree-PIN

A Poostindouz, R Safavi-Naini - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Secret key agreement (SKA) is an essential primitive in cryptography and information
security. In a multiterminal key agreement problem, there are a set of terminals each having …

Secret key generation from Gaussian sources using lattice-based extractors

L Luzzi, C Ling, MR Bloch - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We propose a lattice-based scheme for secret key generation from Gaussian sources in the
presence of an eavesdropper, and show that it achieves the strong secret key capacity in the …

Coordination through shared randomness

GR Kurri, VM Prabhakaran… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We study a distributed sampling problem where a set of processors want to output
(approximately) independent and identically distributed samples from a given joint …

On the Source Model Key Agreement Problem

H Abin, A Gohari - arxiv preprint arxiv:2502.00294, 2025 - arxiv.org
We consider the source model key agreement problem involving two legitimate parties and
an eavesdropper who observe n iid samples of X and Y and Z respectively. The best-known …

Change of multivariate mutual information: From local to global

C Chan, A Al-Bashabsheh… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We study the change of multivariate mutual information among a set of random variables
when some common randomness is added to or removed from a subset of the random …

Secret Key Agreement via Secure Omniscience

PK Vippathalla, C Chan, N Kashyap… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we explore the connection between secret key agreement and secure
omniscience within the setting of the multiterminal source model with an eavesdropper …