Theorem 3. Let 0 < δ < 1, 1 < t1 < 1, 0 < t2 < 1, 1, 2 > 0, n1, n2 N and consider the setting of two independent, partially secret strings, say SI of length n1 and SII of length n2. Then, both strong and weak (n2, n2 ,2,n2 t2 , n2t2 s, 2—s/ ln 2, δ)
Appears in 2 contracts
Sources: Information Theoretic Secret Key Agreement, Information Theoretic Secret Key Agreement