{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:17:41Z","timestamp":1771341461064,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540629757","type":"print"},{"value":"9783540690535","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_15","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"209-225","source":"Crossref","is-referenced-by-count":46,"title":["Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion"],"prefix":"10.1007","author":[{"given":"Ueli","family":"Maurer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"IT-39","author":"R. Ahlswede","year":"1993","unstructured":"R. Ahlswede and I. Csisz\u00e1r, Common Randomness in information theory and cryptography \u2014 part I: secret sharing, IEEE Transactions on Information Theory, Vol. IT-39, 1993, pp. 1121\u20131132.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C. H. Bennett","year":"1992","unstructured":"C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, \u201cExperimental quantum cryptography\u201d, Journal of Cryptology, Vol. 5, no. 1, 1992, pp. 3\u201328.","journal-title":"Journal of Cryptology"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"C.H. Bennett, G. Brassard, C. Cr\u00e9peau, and U.M. Maurer, \u201cGeneralized privacy amplification\u201d, to appear in IEEE Transactions on Information Theory, Nov. 1995.","DOI":"10.1109\/18.476316"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C. H. Bennett","year":"1988","unstructured":"C. H. Bennett, G. Brassard and J.-M. Robert, \u201cPrivacy amplification by public discussion\u201d, SIAM Journal on Computing, Vol. 17, no. 2, April 1988, pp. 210\u2013229.","journal-title":"SIAM Journal on Computing"},{"key":"15_CR5","volume-title":"Theory and Practice of Error Control Codes","author":"R. E. Blahut","year":"1983","unstructured":"R. E. Blahut, Theory and Practice of Error Control Codes, Reading, MA: Addison-Wesley, 1983."},{"key":"15_CR6","volume-title":"Principles and Practice of Information Theory","author":"R. E. Blahut","year":"1987","unstructured":"R. E. Blahut, Principles and Practice of Information Theory, Reading, MA: Addison-Wesley, 1987."},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"J. L. Carter and M. N. Wegman, \u201cUniversal classes of hash functions\u201d, Journal of Computer and System Sciences, Vol. 18, 1979, pp. 143\u2013154.","journal-title":"Journal of Computer and System Sciences"},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"IT-24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"I. Csisz\u00e1r and J. K\u00f6rner, \u201cBroadcast channels with confidential messages\u201d, IEEE Transactions on Information Theory, Vol. IT-24, no. 3, 1978, pp. 339\u2013348.","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, \u201cNew directions in cryptography\u201d, IEEE Transactions on Information Theory, Vol. IT-22, 1976, pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-48329-2_30","volume-title":"Advances in Cryptology \u2014 Proceedings of Crypto\u2019 93","author":"P. Gemmell","year":"1994","unstructured":"P. Gemmell and M. Naor, Codes for interactive authentication Advances in Cryptology \u2014 Proceedings of Crypto\u2019 93, Lecture Notes in Computer Science, Vol. 773, Springer-Verlag, Berlin, 1994, pp. 355\u2013367."},{"issue":"3","key":"15_CR11","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E. N. Gilbert","year":"1974","unstructured":"E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception, Bell Syst. Tech. J., Vol. 53, No. 3, 1974, pp. 405\u2013424.","journal-title":"Bell Syst. Tech. J."},{"key":"15_CR12","volume-title":"Concrete mathematics","author":"R. L. Graham","year":"1990","unstructured":"R. L. Graham, D. E. Knuth and O. Patashnik, Concrete mathematics, Reading, MA: Addison-Wesley, 1990."},{"key":"15_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/3-540-48071-4_32","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 92","author":"U.M. Maurer","year":"1993","unstructured":"U.M. Maurer, Protocols for secret key agreement by public discussion based on common information, Advances in Cryptology \u2014 CRYPTO\u2019 92, Lecture Notes in Computer Science, Berlin: Springer-Verlag, vol. 740, pp. 461\u2013470, 1993."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"IT-39","author":"U. M. Maurer","year":"1993","unstructured":"U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol. IT-39, 1993, pp. 733\u2013742.","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"U. M. Maurer, The strong secret key rate of discrete random triples, Communications and Cryptography, Two Sides of one Tapestry, R.E. Blahut et al. (editors), Kluwer Academic Publishers, 1994, pp. 271\u2013285.","DOI":"10.1007\/978-1-4615-2694-0_27"},{"issue":"1","key":"15_CR16","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3233\/JCS-1996-4104","volume":"4","author":"U. M. Maurer","year":"1996","unstructured":"U. M. Maurer and P.E. Schmid, A calculus for security bootstrapping in distributed systems, Journal of Computer Security, vol. 4, no. 1, pp. 55\u201380, 1996.","journal-title":"Journal of Computer Security"},{"key":"15_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/3-540-68339-9","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u2019 96","author":"U. M. Maurer","year":"1996","unstructured":"U. M. Maurer and S. Wolf, Towards characterizing when information-theoretic secret key agreement is possible, Advances in Cryptology \u2014 ASIACRYPT\u2019 96, K. Kim and T. Matsumoto (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, vol. 1163, pp. 145\u2013158, 1996."},{"key":"15_CR18","unstructured":"U. M. Maurer and S. Wolf, The intrinsic conditional mutual information and perfect secrecy, to appear in Proc. 1997 IEEE Symposium on Information Theory, (Abstracts), Ulm, Germany, June 29\u2013July 4, 1997."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"U. M. Maurer and S. Wolf, Privacy amplification secure against active adversaries, preprint, 1997.","DOI":"10.1007\/BFb0052244"},{"issue":"2","key":"15_CR20","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"15_CR21","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, October 1949, pp. 656\u2013715.","journal-title":"Bell System Technical Journal"},{"key":"15_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Advances in Cryptology \u2014 CRYPTO 84","author":"G. J. Simmons","year":"1985","unstructured":"G. J. Simmons, Authentication theory\/coding theory, in Advances in Cryptology \u2014 CRYPTO 84, G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag, 1985, pp. 411\u2013431."},{"key":"15_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/3-540-48329-2","volume-title":"Advances in Cryptology \u2014 Proceedings of Crypto\u2019 91","author":"D. R. Stinson","year":"1994","unstructured":"D. R. Stinson, Universal hashing and authentication codes, Advances in Cryptology \u2014 Proceedings of Crypto\u2019 91, Lecture Notes in Computer Science, Vol. 576, Springer-Verlag, Berlin, 1994, pp. 74\u201385."},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265\u2013279.","journal-title":"Journal of Computer and System Sciences"},{"issue":"8","key":"15_CR25","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A. D. Wyner","year":"1975","unstructured":"A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, no. 8, 1975, pp. 1355\u20131387.","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:32:06Z","timestamp":1556724726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1997]]}}}