Secret key-private key generation over three terminals: Capacity region.
Huishuai ZhangLifeng LaiYingbin LiangHua WangPublished in: ISIT (2014)
Keyphrases
- secret key
- smart card
- authentication scheme
- public key
- pseudorandom
- secure communication
- stream cipher
- encryption decryption
- security level
- hash functions
- key management
- diffie hellman
- authentication protocol
- encryption scheme
- key distribution
- privacy preserving
- key agreement
- data sets
- forward secure
- low cost
- input image
- signature scheme
- neural network