{"id":"https://openalex.org/W2980247108","doi":"https://doi.org/10.4230/lipics.stacs.2020.21","title":"Secret Key Agreement from Correlated Data, with No Prior Information","display_name":"Secret Key Agreement from Correlated Data, with No Prior Information","publication_year":2019,"publication_date":"2019-10-09","ids":{"openalex":"https://openalex.org/W2980247108","doi":"https://doi.org/10.4230/lipics.stacs.2020.21","mag":"2980247108"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:1910.03757","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.03757","pdf_url":"https://arxiv.org/pdf/1910.03757","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1910.03757","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046763801","display_name":"Marius Zimand","orcid":"https://orcid.org/0000-0002-5938-6599"},"institutions":[{"id":"https://openalex.org/I4322298","display_name":"Towson University","ror":"https://ror.org/044w7a341","country_code":"US","type":"education","lineage":["https://openalex.org/I4322298"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zimand, Marius","raw_affiliation_strings":["Towson University, MD, USA","Towson University, Towson, United States"],"affiliations":[{"raw_affiliation_string":"Towson University, MD, USA","institution_ids":["https://openalex.org/I4322298"]},{"raw_affiliation_string":"Towson University, Towson, United States","institution_ids":["https://openalex.org/I4322298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5046763801"],"corresponding_institution_ids":["https://openalex.org/I4322298"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16303024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6995896100997925},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6504466533660889},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.615078330039978},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6006901264190674},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5840520262718201},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5598722100257874},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5366603136062622},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5159921646118164},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5154198408126831},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5035225749015808},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4923020601272583},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.4836626946926117},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.4820728898048401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48097312450408936},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2767274081707001},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20060142874717712},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1681673228740692},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08754977583885193}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6995896100997925},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6504466533660889},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.615078330039978},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6006901264190674},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5840520262718201},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5598722100257874},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5366603136062622},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5159921646118164},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5154198408126831},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5035225749015808},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4923020601272583},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.4836626946926117},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.4820728898048401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48097312450408936},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2767274081707001},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20060142874717712},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1681673228740692},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08754977583885193},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"pmh:oai:arXiv.org:1910.03757","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.03757","pdf_url":"https://arxiv.org/pdf/1910.03757","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:drops-oai.dagstuhl.de:11882","is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.STACS.2020.21","pdf_url":"https://drops.dagstuhl.de/storage/00lipics/lipics-vol154-stacs2020/LIPIcs.STACS.2020.21/LIPIcs.STACS.2020.21.pdf","source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"InProceedings"},{"id":"mag:2980247108","is_oa":true,"landing_page_url":"http://arxiv.org/pdf/1910.03757.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1910.03757","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1910.03757","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"doi:10.4230/lipics.stacs.2020.21","is_oa":true,"landing_page_url":"https://doi.org/10.4230/lipics.stacs.2020.21","pdf_url":null,"source":{"id":"https://openalex.org/S7407052059","display_name":"Dagstuhl Research Online Publication Server","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":""}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1910.03757","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.03757","pdf_url":"https://arxiv.org/pdf/1910.03757","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4158515515","display_name":null,"funder_award_id":"CCF 1811729","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8303837126","display_name":null,"funder_award_id":"1811729","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W826483","https://openalex.org/W2007661134","https://openalex.org/W2077050034","https://openalex.org/W2086467753","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2119913278","https://openalex.org/W2120222618","https://openalex.org/W2523917704","https://openalex.org/W2568827018","https://openalex.org/W2571410429","https://openalex.org/W2962857961","https://openalex.org/W2981786233"],"related_works":["https://openalex.org/W3013454588","https://openalex.org/W234346714","https://openalex.org/W2048207662","https://openalex.org/W2560917486","https://openalex.org/W3042913387","https://openalex.org/W2394002520","https://openalex.org/W2279792472","https://openalex.org/W2951593252","https://openalex.org/W2009604093","https://openalex.org/W2552586026","https://openalex.org/W20180677","https://openalex.org/W2949311747","https://openalex.org/W3029310037","https://openalex.org/W2736281244","https://openalex.org/W2096604262","https://openalex.org/W2500005791","https://openalex.org/W2601403718","https://openalex.org/W2949271857","https://openalex.org/W3030848201","https://openalex.org/W2184491084"],"abstract_inverted_index":{"A":[0],"fundamental":[1],"question":[2],"that":[3,36,82,85,101,115,143,149,195],"has":[4,45],"been":[5,46,56],"studied":[6,47],"in":[7,10,29,39,49,79,192],"cryptography":[8],"and":[9,52,131,153],"information":[11,50],"theory":[12],"is":[13,154,189],"whether":[14],"two":[15,32,87,135,200],"parties":[16,33,88,137,202],"can":[17],"communicate":[18],"confidentially":[19],"using":[20],"exclusively":[21],"an":[22,147],"open":[23],"channel.":[24],"We":[25,111],"consider":[26],"the":[27,31,60,65,73,80,86,94,107,134,151,164,167,184,187,193,196,199,207,211],"model":[28,44],"which":[30,58],"hold":[34],"inputs":[35,66],"are":[37,76],"correlated":[38],"a":[40,67,113,140,158],"certain":[41],"sense.":[42],"This":[43],"extensively":[48],"theory,":[51],"communication":[53,152],"protocols":[54,75],"have":[55],"designed":[57],"exploit":[59],"correlation":[61,130],"to":[62,128,138,146,156,210],"extract":[63],"from":[64,180],"shared":[68],"secret":[69],"key.":[70],"However,":[71],"all":[72],"existing":[74],"not":[77,117,175,190],"universal":[78],"sense":[81,194],"they":[83,99],"require":[84,100,118],"also":[89],"know":[90],"some":[91],"attributes":[92],"of":[93,161,198],"correlation.":[95],"In":[96],"other":[97,108],"words,":[98],"each":[102],"party":[103],"knows":[104],"something":[105],"about":[106],"party's":[109],"input.":[110],"present":[112],"protocol":[114,168,188],"does":[116,174],"any":[119,177],"prior":[120],"additional":[121],"information.":[122],"It":[123],"uses":[124,203],"space-bounded":[125],"Kolmogorov":[126],"complexity":[127],"measure":[129],"it":[132,173],"allows":[133],"legal":[136,201],"obtain":[139],"common":[141],"key":[142],"looks":[144],"random":[145],"eavesdropper":[148],"observes":[150],"restricted":[155],"use":[157,176],"bounded":[159],"amount":[160],"space":[162,205,208],"for":[163],"attack.":[165],"Thus":[166],"achieves":[169],"complexity-theoretical":[170],"security,":[171],"but":[172],"unproven":[178],"result":[179],"computational":[181],"complexity.":[182],"On":[183],"negative":[185],"side,":[186],"efficient":[191],"computation":[197],"more":[204],"than":[206],"allowed":[209],"adversary.":[212]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
