{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T01:36:45Z","timestamp":1766281005465},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_32","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:23:49Z","timestamp":1186349029000},"page":"461-470","source":"Crossref","is-referenced-by-count":43,"title":["Protocols for Secret Key Agreement by Public Discussion Based on Common Information"],"prefix":"10.1007","author":[{"given":"Ueli M.","family":"Maurer","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"32_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, Experimental quantum cryptography, Journal of Cryptology, Vol. 5, No. 1, 1992, pp. 3\u201328.","journal-title":"Journal of Cryptology"},{"doi-asserted-by":"crossref","unstructured":"C.H. Bennett, G. Brassard and J.-M. Robert, How to reduce your enemy\u2019s information, Advances in Cryptology-Crypto\u2019 85, Springer Verlag, New York, pp. 468\u2013476.","key":"32_CR2","DOI":"10.1007\/3-540-39799-X_37"},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C.H. Bennett","year":"1988","unstructured":"C.H. Bennett, G. Brassard and J.-M. Robert, Privacy amplification by public discussion, SIAM Journal on Computing, Vol. 17, No. 2, 1988, pp. 210\u2013229.","journal-title":"SIAM Journal on Computing"},{"key":"32_CR4","volume-title":"Principles and Practice of Information Theory","author":"R.E. Blahut","year":"1987","unstructured":"R.E. Blahut, Principles and Practice of Information Theory, Reading, MA: Addison-Wesley, 1987."},{"issue":"3","key":"32_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"I. Csisz\u00e1r and J. K\u00f6rner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, Vol. 24, No. 3, 1978, pp. 339\u2013348.","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"S.K. Leung-Yan-Cheong. Multi-user and wiretap channels including feedback, Tech. Rep. No. 6603-2, Stanford University, Information Systems Lab., July 1976.","key":"32_CR6"},{"issue":"1","key":"32_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/BF00191321","volume":"5","author":"U.M. Maurer","year":"1992","unstructured":"U.M. Maurer, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, Vol. 5, No. 1, 1992, pp. 53\u201366.","journal-title":"Journal of Cryptology"},{"unstructured":"U.M. Maurer, Secret key agreement by public discussion from common information, to appear in IEEE Transactions on Information Theory.","key":"32_CR8"},{"key":"32_CR9","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, Oct. 1949, pp. 656\u2013715.","journal-title":"Bell System Technical Journal"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265\u2013279.","journal-title":"Journal of Computer and System Sciences"},{"issue":"8","key":"32_CR11","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"A.D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, 1975, pp. 1355\u20131387.","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:50:13Z","timestamp":1619556613000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_32","relation":{},"subject":[]}}