|
|
|
|
LEADER |
02087 am a22002653u 4500 |
001 |
91131 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Zhou, Hongchao
|e author
|
100 |
1 |
0 |
|a Lincoln Laboratory
|e contributor
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
|e contributor
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Research Laboratory of Electronics
|e contributor
|
100 |
1 |
0 |
|a Zhou, Hongchao
|e contributor
|
100 |
1 |
0 |
|a Chandar, Venkat B.
|e contributor
|
100 |
1 |
0 |
|a Wornell, Gregory W.
|e contributor
|
700 |
1 |
0 |
|a Chandar, Venkat B.
|e author
|
700 |
1 |
0 |
|a Wornell, Gregory W.
|e author
|
245 |
0 |
0 |
|a Low-density random matrices for secret key extraction
|
260 |
|
|
|b Institute of Electrical and Electronics Engineers (IEEE),
|c 2014-10-21T17:47:58Z.
|
856 |
|
|
|z Get fulltext
|u http://hdl.handle.net/1721.1/91131
|
520 |
|
|
|a Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum key distribution, we study secret-key extraction methods with simple and efficient hardware implementations, in particular, linear transformations based on low-density random matrices. We show that this method can achieve the information-theoretic upper bound (conditional Shannon entropy) on efficiency for a wide range of key-distribution systems. In addition, we introduce a numerical method that allows us to tightly estimate the quality of the generated secret key in the regime of finite block length, and use this method to demonstrate that low-density random matrices achieve very high performance for secret key extraction.
|
520 |
|
|
|a United States. Air Force Office of Scientific Research (Grant FA9550-11-1-0183)
|
520 |
|
|
|a United States. Defense Advanced Research Projects Agency. Information in a Photon (InPho) Program (Contract HR0011-10-C-0159)
|
546 |
|
|
|a en_US
|
655 |
7 |
|
|a Article
|
773 |
|
|
|t Proceedings of the 2013 IEEE International Symposium on Information Theory
|