Affordable Access

Access to the full text

A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange

Authors
  • Koizumi, Koichi1
  • Mizuki, Takaaki2
  • Nishizeki, Takao3
  • 1 Fukushima National College of Technology, Department of Electrical Engineering, Tairakamiarakawa-Aza-Nagao 30, Iwaki-shi, Fukushima, 970-8034, Japan , Fukushima (Japan)
  • 2 Tohoku University, Information Synergy Center, Aramaki-Aza-Aoba 6-3, Aoba-ku, Sendai, 980-8578, Japan , Sendai (Japan)
  • 3 Tohoku University, Graduate School of Information Sciences, Aramaki-Aza-Aoba 6-6-05, Aoba-ku, Sendai, 980-8579, Japan , Sendai (Japan)
Type
Published Article
Journal
Theory of Computing Systems
Publisher
Springer-Verlag
Publication Date
Oct 03, 2007
Volume
42
Issue
2
Pages
187–221
Identifiers
DOI: 10.1007/s00224-007-9052-3
Source
Springer Nature
Keywords
License
Yellow

Abstract

The transformation protocol can allow two players to share an unconditionally secure secret key using a random deal of cards. A sufficient condition on the number of cards for the transformation protocol to succeed was known. However, it has been an open problem to obtain a necessary and sufficient condition. This paper improves the transformation protocol and gives a necessary and sufficient condition for the resulting protocol to succeed.

Report this publication

Statistics

Seen <100 times