{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:09:12Z","timestamp":1730344152976,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664348","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T23:49:11Z","timestamp":1552348151000},"page":"120-124","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Amplification: Recent Developments and Applications"],"prefix":"10.23919","author":[{"given":"Wei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Rafael F.","family":"Schaefer","sequence":"additional","affiliation":[]},{"given":"H. Vincent","family":"Poor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Wiretap channels: Nonasymptotic fundamental limits","year":"2017","author":"yang","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006906"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541867"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620720"},{"key":"ref10","volume":"1","author":"feller","year":"1970","journal-title":"An Introduction to Probability Theory and Its Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2030478"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110950"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2278971"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028449"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2567440"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2530084"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2238657"},{"key":"ref28","first-page":"547","article-title":"On measures of entropy and information","volume":"1","author":"r\u00e9nyi","year":"1961","journal-title":"Proc 4th Berkeley Symp Math Statist and Prob"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref27","first-page":"199216","article-title":"Simple and tight bounds for information reconciliation and privacy amplification","author":"renner","year":"2005","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/0217014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref29","article-title":"?-mutual information","author":"verd\u00fa","year":"2015","journal-title":"Proc Inf Theory Appl Workshop"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018340"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541842"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/978-3-642-32009-5_18","article-title":"Semantic security for the wiretap channel","volume":"7417","author":"bellare","year":"2012","journal-title":"Advances in Cryptology (Lecture Notes in Computer Science)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536496"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref20","first-page":"2629","article-title":"E?-resolvability","volume":"63","author":"liu","year":"2017","journal-title":"IEEE Trans Inf Theory"},{"key":"ref22","first-page":"351","article-title":"Information-theoretic key agreement: From weak to strong secrecy for free","author":"maurer","year":"2000","journal-title":"Proc 19th Int Conf Theory and Appl Cryptographic Tech"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162275"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2043769"},{"key":"ref23","first-page":"148","article-title":"On the method of bounded differences","volume":"141","author":"mcdiarmid","year":"1989","journal-title":"Surveys in Combinatorics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749908003256"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2865386"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664348.pdf?arnumber=8664348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:56:53Z","timestamp":1643270213000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664348","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}