{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:19:55Z","timestamp":1725898795750},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_6","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"78-94","source":"Crossref","is-referenced-by-count":0,"title":["Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities"],"prefix":"10.1007","author":[{"given":"Hadi","family":"Ahmadi","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"39","author":"R. Ahlswede","year":"1993","unstructured":"Ahlswede, R., Csisz\u00e1r, I.: Common randomness in information theory and cryptography. Part I: secret sharing. IEEE Transaction on Information Theory\u00a039, 1121\u20131132 (1993)","journal-title":"IEEE Transaction on Information Theory"},{"key":"6_CR2","unstructured":"Ahmadi, H., Safavi-Naini, R.: Secret key establishment over a pair of independent broadcast channels. In: International Symposium on Information Theory and its Application, pp. 185\u2013190 (2010); Full version on the arXiv preprint server, arXiv:1001.3908"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Ahmadi, H., Safavi-Naini, R.: New results on key establishment over a pair of independent broadcast channels. In: International Symposium on Information Theory and its Application, pp. 191\u2013196 (2010); Full version on the arXiv preprint server, arXiv:1004.4334v1","DOI":"10.1109\/ISITA.2010.5650104"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-20728-0_8","volume-title":"Information Theoretic Security","author":"H. Ahmadi","year":"2011","unstructured":"Ahmadi, H., Safavi-Naini, R.: Common Randomness and Secret Key Capacities of Two-Way Channels. In: Fehr, S. (ed.) ICITS 2011. LNCS, vol.\u00a06673, pp. 76\u201393. Springer, Heidelberg (2011)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-20465-4_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"H. Ahmadi","year":"2011","unstructured":"Ahmadi, H., Safavi-Naini, R.: Secret Keys from Channel Noise. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 266\u2013283. Springer, Heidelberg (2011)"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., Wegman, M.N.: Universal Classes of Hash Functions. Journal of Computer and System Sciences\u00a018, 143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1137\/0217015","volume":"17","author":"B. Chor","year":"1988","unstructured":"Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing\u00a017, 230\u2013261 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Cover, T.M., Thomas, J.: Elements of information theory, 2nd edn. Wiley-IEEE (2006)","DOI":"10.1002\/047174882X"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., K\u00f6rner, J.: Broadcast channels with confidential messages. IEEE Transaction on Information Theory\u00a024, 339\u2013348 (1978)","journal-title":"IEEE Transaction on Information Theory"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Csisz\u00e1r, I., K\u00f6rner, J.: Information theory: coding theorems for discrete memoryless systems, 2nd edn., Cambridge (2011)","DOI":"10.1017\/CBO9780511921889"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/18.825796","volume":"46","author":"I. Csisz\u00e1r","year":"2000","unstructured":"Csisz\u00e1r, I., Narayan, P.: Common randomness and secret key generation with a helper. IEEE Transaction on Information Theory\u00a046, 344\u2013366 (2000)","journal-title":"IEEE Transaction on Information Theory"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-540-27821-4_30","volume-title":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Elbaz, A., Oliveira, R., Raz, R.: Improved Randomness Extraction from Two Independent Sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) APPROX and RANDOM 2004. LNCS, vol.\u00a03122, pp. 334\u2013344. Springer, Heidelberg (2004)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Khisti, A., Diggavi, S., Wornell, G.: Secret key generation with correlated sources and noisy channels. In: IEEE International Symposium on Information Theory, pp. 1005\u20131009 (2008)","DOI":"10.1109\/ISIT.2008.4595138"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U. Maurer","year":"1993","unstructured":"Maurer, U.: Secret key agreement by public discussion from common information. IEEE Transaction on Information Theory\u00a039, 733\u2013742 (1993)","journal-title":"IEEE Transaction on Information Theory"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"U. Maurer","year":"2000","unstructured":"Maurer, U., Wolf, S.: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 351\u2013368. Springer, Heidelberg (2000)"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIT.2006.872968","volume":"52","author":"C. Mitrpant","year":"2006","unstructured":"Mitrpant, C., Han Vinck, A.J., Luo, Y.: An achievable region for the Gaussian wiretap channel with side information. IEEE Transaction on Information Theory\u00a052, 2181\u20132190 (2006)","journal-title":"IEEE Transaction on Information Theory"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1006\/jcss.1996.0004","volume":"52","author":"N.. Nisan","year":"1996","unstructured":"Nisan, N., Zuckerman, D.: Randomness is linear in space. Journal of Computer and System Science\u00a052, 43\u201352 (1996)","journal-title":"Journal of Computer and System Science"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Prabhakaran, V., Eswaran, K., Ramchandran, K.: Secrecy via sources and channels - a secret key - secret message rate trade-off region. In: IEEE International Symposium on Information Theory, pp. 1010\u20131014 (2008)","DOI":"10.1109\/ISIT.2008.4595139"},{"key":"6_CR19","unstructured":"Shannon, C.E.: Two-way communication channels. In: 4th Berkeley Symposium on Mathematical Statistics and Probability, vol.\u00a01, pp. 611\u2013644 (1961)"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","volume":"54","author":"E. Tekin","year":"2008","unstructured":"Tekin, E., Yener, A.: The general Gaussian multiple access channel and two-way wire-tap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory\u00a054, 2735\u20132751 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR21","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell System Technical Journal\u00a054, 1355\u20131367 (1975)","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T15:51:37Z","timestamp":1688140297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}