The present invention is a U.S. National Stage under 35 USC 371 patent application, claiming priority to Serial No. PCT/FR2016/000070, filed on 6 Apr. 2016; which claims priority of FR 15/00759, filed on 14 Apr. 2015, the entirety of both of which are incorporated herein by reference.
The invention relates to cryptographic systems.
Modern cryptography mostly relies on mathematical problems commonly trusted as very difficult to solve, such as large integer factorization or discrete logarithm, belonging to complexity theory. As no certainty exist on the actual difficulty of those problems, not even the truth of the famous P≠NP conjecture, some other methods, rather based on information theory, have been developed since early 90's. Those methods relies on hypothesis about the opponent (such as «memory bounded» adversary [6]) or about the communication channel (such as «independant noisy channels» [5]); unfortunately, if their perfect secrecy have been proven under given hypothesis, none of those hypothesis are easy to ensure in practical. At last, some other methods based on physical theories like quantum undetermination [3] or chaos generation have been described and experimented, but they are complex to implement, and, again, relies on not proven theories.
Considering this unsatisfying situation, we propose a new method, where proven perfect secrecy can be reached, without relying on any assumption about the opponent, that is supposed to have unlimited calculation and storage capacities, nor about the communication channel, that is supposed to be perfectly public, accessible and equivalent for any playing party (legitimate partner and opponent). The considered opponent is passive, which means that it does not interfere actively in the communication by suppressing, adding or modifying information exchanged between the legitimate partners; it just has a full access to it. Active opponent can also be considered by adding authentication schemes between the legitimate partners in the communication protocol.
We consider two Autonomous Entities (AE), called legitimate corresponding AE, willing to communicate over an insecure public channel. Like in every classical protocol modelization, those AE are entities capable to generate random bit strings, publish bit strings, read bit strings published by other AE on the public channel, store bit strings, make calculation on bit strings. The main difference of our method is that random generation includes Deep Random generation. Deep Random is a source of digital randomness such that an external obsever cannot know anything about the probability distribution of the digital random variable, except some public characteristics. Thus, such Deep Random variables are not subject to Bayesian inference evaluation.
An AE is constituted (
The Deep Random Generator (DRG). A DRG is capable of:
Producing continuously new/evolutive probability distributions, called Deep Random distributions, whose characteristic is given below
Generating and storing, upon request of authorized associated ICM, some random digital information using its Deep Random probability distributions, those information having to remain secret for the purpose of the secrecy of the communication
Performing, upon request of authorized associated ICM, calculations involving the said secret digital information
The Interactive Communication Module (ICM). An ICM is capable of:
Publishing information on the public channel (to the attention of its legitimate corresponding AE)
Reading information from the public channel
Executing a communication protocol called Perfect Secrecy Protocol, whose characteristic is given below.
The two main characteristics of the present invention are (i) the generation of Deep Random probability distributions, and (ii) the execution of Perfect Secrecy Protocol. They are designed to work together, which gives the unity of the invention. They produce perfect secrecy without the need of prearrangement of secret key and without any condition or limitation regarding the communication channel and the opponent, which gives the innovativeness and usefulness of the invention. They can be embodied in several forms, but at least one is described in the section 5 below, which shows that such invention is subject to industrial application. In addition, the author did obtain the mathematical proof of the perfect secrecy, which was not the case with former patented methods; nevertheless, the details of this mathematical proof are complex and thus are not explicited in the present description.
(i) Characteristics of Deep Random Generators:
Deep Random generated by an AE called A is a source of randomness such that its probability distribution is made practically unknowledgeable (or hidden) for a given set of AE called opponents, and each one denoted ξ. In practice, this set of AE is generally all AE other than A. More generally, the probability distribution may be hidden for ξ except a public characteristical information I (we denote ΩI the set of probability distributions verifying the characteristical information I). Such a randomness source has the following characteristic:
If X and Y are two random variables, and if X has a hidden probability distribution for ξ except a given characteristical information I, then:
E[φ(X)|Y]ξ has no dependency with probability distribution of X within ΩI (H)
where E[φ(X)|Y]ξ designates the conditional expectation of φ(X) from restricted knowledge of Y by ξ.
We can give a weaker, but more concrete formulation of this characteristic, associated to engendered variables. As a general definition, if V is a random variable with values in a set E, a random variable V′ with values in a set F is engendered variable from V if there exists an engendering distribution ψ:E×F[0,1] such that ∀x∈E, Σy∈F ψ(y, x)∂y=1 and being the probability distribution of V′:
P(V′=y|V=x)=ψ(y,x)
The weaker formulation is then the following: let Y be a random variable with values in F, engendered by any variable with values in E through the same engendering distribution ψ:E×F[0,1]. If X and X′ are two random variables with values in E and probability distributions in ΩI both hidden for ξ except the characteristical information I, then:
E[φ(X)|Y]ξ=E[φ(X′)|Y]ξ (H′)
Viewed from AE to which the probability distribution is hidden, the capabilities of calculation related to that random variable are of course more limited than for a traditional one in probability theory. The concept of «weighting» of possible values in sample space, is replaced by the concept of simple existence of such values.
It is important to understand that stating that a random variable's probability distribution is unknowledgeable doesn't mean that its probability distribution doesn't exist. It only means that it is hidden to a given set of AE. For any other AE (knowing probability distribution of X), the random variable remains governed by traditional probability theory.
It may appear as a non sense to desire to generate Deep Random from a deterministic computable program. In the real world, even a computer may access sources of randomness whose probability distribution is at least partly unknown, but it doesn't mean that we can build from it Deep Random reliable for cryptographic applications.
3 methods exist to generate programmatically Deep Random within an AE:
1) Secure programming: in this method, the program generating Deep Random (DRG) is securely elaborated within a closed industrial process and is kept secret to external AE. For industrial application, it is embedded into tamper resistant device and can only be requested to generate a given output random signal
2) Recursive generation: in this method the DRG program executes a continuous recursive generation sequence, where at each step m+1, the probability distribution is created/selected to defeat the prediction of the optimal predicting strategy for the probability distributions of steps ≤m. This method can be implemented in a program that is continuously running in a computing environment, and that can be requested at any time to output a random signal taken from a draw based on the current value of the probability distribution sequence. Such implementation can be done in software or embedded in tamper resistant hardware to improve confidentiality of the current stance of the counter and of the probability distribution sequence. For such a method to be secure, the entropy of the output random signal should not be greater than the entropy of the current counter value. An example of such method is given in section 5.
3) Combination: in this method, different sources of Deep Randomness are combined. Those sources can come from external collaborative AE as per
Regarding the recursive generation, if one doesn't know the date of beginning and the speed of an infinite counter, no probability distribution can be even approximated about the value of the counter at a given time, because of the unlimited nature of a counter. If performed in a physical computing source, the actual speed of the counter is impacted by all external tasks of the processor, for which no probability distribution can be estimated, the only thing that an opponent can do is estimate a rough upper bound of that speed.
(ii) Characteristics of Perfect Secrecy Protocol:
Let's first define our general communication protocol model.
A protocol is a communication procedure involving 2 legitimate communicating AE (A and B) that can be decomposed in a finite number of steps t1, . . . , tR such that at each step r<R:
a) A and B generate respectively a new information xr and yr (using potentially classical random or Deep Random thanks to their DRG as per
b) A and B publish respectively an information it and jr that may depend respectively on {xm}1≤m<r, {im,jm}1≤m<r, and {ym}1≤m<r, {im,jm}1≤m<r. To that extent the ICM writes the information on the public channel as per
At last step R, A and B only perform calculations involving the knowledge of respectively {xm}1≤m<R, {im,jm}1≤m<R, and {ym}1≤m<R, {im,jm}1≤m<R. One of the result of those calculations (as per
{v}v is called a configurable protocol, with v a vector of numerical parameters fixed before running the protocol, if the description of the implementation of the protocol (including the capacity of generating Deep Random) have a size bounded by H(v)+K, where H is the entropy and K a constant not depending on v.
Perfect Secrecy Protocols are special protocols within the above general model, for which, assuming the above (H) and (H′) for signal generated by DRG, the most efficient strategy for an opponent (conditional expectation) to estimate say VA is less efficient than VB (Advantage Distillation [4]). Such protocols also include a so called Reconciliation and Privacy Amplification methods [4] to transform the said Advantage into a secure shared information exclusively between legitimate partners. This information, that can be of size as long as desired (repetition of the protocol), can be used to exchange securely a meaningful message between the legitimate partners or directly (one time pad XOR) or by exchanging a symmetric cryptographic key applicable with any block or stream cipher.
More formally, if we consider a protocol P, the whole set of random information generated by respectively A and B obey to a probability distribution respectively in sets that we call A(P) and
B(P). The use of Deep Random enables to consider, depending on P, several subsets of
A(P)×
B(P):(H1A,H1B), . . . such that they contain only distributions that cannot be distinguished between each others by the opponent. Those subsets are supposed to be maximized (because they can be complemented if not). We can consider the group of reversible transforms {hm(s)}m (supposed to be enumerable) of
A(P)×
B(P)
A(P)×
B(P), that let (HsA,HsB) stable. Each of those transforms induces a reversible transform
. We thus denote
(s) the subset of
containing the strategies invariant by action of the induced group {
(s).
We denote (ε,ε′) the minimum quantity (number of digits) that is to be exchanged through P to obtain:
dh(VA,VB)≤εH(VB) (i)
infs(sup(s)|dh(ω,vB)−½H(VB)|)≤ε′H(VB) (ii)
Where dh denotes the Hamming's distance, and H(⋅) denotes Shannon's entropy [1]. If the 2 conditions above cannot be fulfilled, then (ε,ε′)=∞. A configurable protocol {Pv}v is called a Perfect Secrecy Protocol if, ∀ε,ε>0, there exists v(ε,ε′) under hypothesis of the Deep Random (H) and (H′), such that
v(ε,ε′)<∞
The three minimal characteristics of Perfect Secrecy Protocols are:
1) Deep Random (DR): Both legitimate partner involved in the protocol make use of a DRG
2) Degradation: For both legitimate partner involved in the protocol, the information published by it is at least partly degraded from the associated output signal generated by its DRG. This means that the published information is the result of an engendered variable from the output signal generated by the DRG such that the accuracy of the output of the said engendered variable is made lesser (through the degradation process) than the accuracy of the output signal generated by the DRG.
3) Advantage Distillation under DR assumption ((H) and (H′)): Under (H) and (H′), a strategy for the opponent cannot be considered as more efficient than at least one other strategy belonging to a given set Ω, called restriction set of strategies for the protocol; and for any strategy in Ω adopted by the opponent, the estimation of the shared information given by the said strategy is strictly less accurate than the estimations of the legitimate partners.
To illustrate degradation, let's give a simple example: let's consider an AE beholding an experiment of binary random variable V with parameter θ∈[0,1]. If the AE wants to generate a new binary random variable based on the result of the experiment, it can only affect parameters {θ0,θ1} depending on the {0,1} result of the experiment of V. The parameter of the new binary random variable V′ is then:
θ0+(θ1−θ0)θ
Let's now replace θ by θ/k where k is a real number >1; it is thus impossible to engender from V a binary random variable with parameter θ (because |θ1−θ0|≤1). The beholding AE can of course multiplicate the obtained experiment by k (resulting into an engendered variable with value in {0,k} instead of {0,1}), in order to obtain an engendered variable with same first moment than V, but the variance (second moment, representing accuracy) of that engendered variable is then strictly larger than the variance of V. The AE then have to «make a choice» between first and second moment, but cannot get both in the same engendered variable.
An example of such Perfect Secrecy Protocol is given in section 5, as specific embodiment of the invention.
i) Description of a Specific Embodiment of Deep Random Generator
The specific embodiment presented in this section corresponds to a recursive method as per section 3. (i) 2), associated with a combination method as per section 3. (i) 3). It can be implemented in a software program or tamper resistant hardware device.
An Internal Recursive DR Distribution Generator, that produces [
An Internal Standard Random Generator, that produces and outputs upon request [
A Communication Interface, that enables to receive order from an associated ICM [
An Internal Memory, that enables the Communication Interface to store, retrieve or suppress [
In the following of this section 5.i), it will be focused on an example of the Internal Recursive DR Distribution Generator.
Let's define some notations; considering x=(x1, . . . , xn) and y=(y1, . . . , yn) some parameter vectors in [0,1]n and i=(i1, . . . , in) and j=(j1, . . . , jn) some experiment vectors in {0,1}n, l, r∈n* two integers, and θ∈[0,1], we define:
We associate to any distribution quadratic matrix MΦ the matrix
We will denote in the followings:
where ω denotes any strategy chosen by the opponent, depending on the public information i,j (this set of possible strategies is denoted Ω), to bestly estimate
i,j are experiment vectors in {0,1}n generated from a Bernouilli distribution from the respective parameter vectors
The transform
is the Degradation (as per section 3.(ii)) used in the present method, for both the DRG and the Perfect Secrecy Protocol described hereafter.
Finally, we denote:
ζ(α){Φ|∥MΦ−
where α∈[0,1] is a scalar lower bound chosen as a configuration parameter, its value is a trade-off between the size of the entropy of the set of possible distributions, and the efficiency of the Synchronization step of the hereafter presented Perfect Secrecy Protocol; ζ(α) corresponds to the set of distributions that are «far» from being symmetric. Only such distributions can be considered in the hereafter presented Perfect Secrecy Protocol to ensure the efficiency of its Synchronization step (Step 4).
Having set those notations, we can describe the constructing process of the sequences of probability distributions {Φ[p] executed by the Internal Recursive DR Distribution Generator of our specific DRG embodiment, DRG(N, n, k):
The Unitary Recursive Generation Process:
The set of possible quadratic matrix (if Φ is restricted over {0,1}n) is the convex envelop of all matrix in the set:
{σ(Sr)|σ∈n,r∈
n}
where
corresponding to the matrix of the Dirac distribution for the vector {1, . . . , 1r, 0, . . . , 0}.
We can easily calculate that, for r not too close from 0 or 1:
and therefore to determine if the Dirac distribution δx∈ζ(α).
The initial seed Φ0 of the process is taken among any predefined subset of ζ(α) that can be ranged algorithmically. In the present embodiment, we consider for instance the subset of all convex linear combination of Dirac distributions that remains in ζ(α).
σ1=In
Φ1=Φ0∘σ1
{circumflex over (ω)}m is performing a minimum value in:
where {λm,s}s≤m is called the characteristic function of the DRG, that verifies
Ψ is chosen randomly in the initial subset, and it can be proven (the details are complex and are not presented in this description) that one can choose σm+1 such that:
Then we set Φm+1 as:
Φm+1=Ψ∘σm+1
{circumflex over (ω)}m and σm+1 can be determined (using also classical randomness regarding Ψ and σm+1) at each step by the Internal Recursive DR Distribution Generator.
Then we can use a method to combine distributions in (a):
The Internal Combination Process:
We first select Ψ in ζ(α), and a set {Ψs}s∈{1, . . . , N} of «to be combined» distributions also in ζ(α). Let σs be a permutation such that
it can be proved (the details are complex and are not presented in this description) that such permutation always exists. Thus,
and the combined distribution is then:
The association of the Unitary Recursive Generation Process and the Internal Combination Process presented above gives the following description of the Internal Recursive DR Distribution Generator DRG(N, n, k) (as per [
The AE runs a recursive and continuous generation process in which N continuos sequences {Φ[p] are running in parallel according to a Unitary Recursive Generation Process presented above. It can also be decided (over random decision) to update the current value of a given sequence by a combination of the current values of the sequences using the Internal Combination Process presented above. The quality of the Deep Random depends on the variety of the initial subset and also on the increasing number of steps (rounds) performed in each sequences. The Internal Recursive DR Distribution Generator should run at least during n x N steps before receiving any request from an ICM. N should be roughly equal to ln (n!)˜n ln(n), which represent the entropy needed to encode a member of the set of permutations
n.
At the time when an ICM request the selection of DR distribution to the DRG (as per [
where t is the instant of the execution of this process, {p1, . . . , pr} are the indices of the c selected sequences, mr(t) is the current value of the counter of the sequence Φ[pr] at the instant of the execution. The justification of this process is that the final distribution should be in an almost convex subset, and thus should also have its α-parameter in a convex segment. Indeed, the Dispersion step (step 2) of the Perfect Secrecy Protocol presented hereafter uses the convex transformation
and this transformation lowers the α-parameter; a linear convex transformation with c summed distributions roughly lowers the α-parameter with a multiplicative constant 1/c. Of course, even if this process enables then to trustfully apply the hypothesis (H) and (H′) presented in the summary of the invention, the price to pay is that it introduces some low-probability occurrences in which the opponent can win with the separable strategy
because, by lowering the α-parameter, one obtains that the elected distribution comes closer to a symmetric one. Those low-probability occurrences thus correspond to the case of large values of c, which is roughly equivalent to low values of the the α-parameter.
Ultimately, the elected distribution Φ is also transformed (always within interaction [
where γ, called a permutative sleeking kernel, is a function n*→[0,1] (note that it is impossible that |σ|=1 and thus the component for 1 can be ignored) that verifies:
This final transform is necessary to «smooth» the Dirac distributions, and avoid specific prevarication (the technical details are too complex to be presented in this description). The permutative sleeking kernel γ is chosen as a configuration parameter of the DRG.
The explanation about the design of Unitary Recursive Generation Process within this specific embodiment DRG(N, n, k) is the following:
With an infinite counter privately executed within the Internal Recursive DR Distribution Generator, the moments m and m+1 are indistinguishable for the opponent ξ. If a set Ωm of winning strategies at the moment m exists for ξ, then for any probability distribution Φ:
and thus, by choosing at moment m+1 the probability distribution Φm+1 such that:
(which is always possible as explained above) the AE guarantees, provided that
that no absolute winning strategy exist to estimate
because the moment of observation cannot be determined by opponent as rather being m or m+1.
On the other hand, by denoting
where x,y would be experiment from Φ, it can be calculated that:
This process is indeed generating Deep Randomness, because if not, the opponent would be able by Bayesian inference to estimate
from the public information i,j with the same accuracy than VA or VB.
ii) Description of a Specific Embodiment of Perfect Secrecy Protocol
P(λ, θ, N, n, k) in block diagram form, where (λ,θ,N,n,k) are public parameters of the protocol, set up between the corresponding entities denoted A and B.
A and B are two AE, called the legitimate partners, each equipped with a DRG and an ICM. Both ICM are connected to the errorless public channel, so that A and B can publish on the channel, and read the information published by the other party.
The steps of the protocol (λ, θ, N, n, k) are the followings:
Step 1—Deep Random Generation:
A and B both independently run a recursive generation sequence of Deep Random probability distributions [
Step 2—Dispersion:
A also picks a second probability distribution W from its DRG(N, n, k) as per [
Step 3—Degradation:
A generates N+1 Bernouilli experiment vectors {i0, . . . , iN}∈{{0,1}n}N+1 respectively from
as per [
Step 4—Synchronization:
B reads {i0, . . . , iN} from the public channel as per [ ∈
n that satisfies the condition:
and then generates a Bernouilli experiment vectors j0∈{0,1}n from
B publishes j0 as per [
Step 5—Advantage Distillation:
A reads j0 from the public channel as per [
as per [
as per [
Step 6: classical reconciliation and privacy amplification techniques lead to get accuracy as close as desired from perfection between estimations of legitamate partners, and knowledge as close as desired from zero by any unlimitedly powered opponent.
It can be proved (the details are complex and are not presented in this description) that appropriate choice of the parameters (λ, θ, N, n, k) enables to make steps 4 and 6 possible. The use of Deep Random as described in steps 1 and 2 enable to restrict the strategies of the opponent as follows:
Dispersion step of the protocol enables to restrict to the set of strategies ωj
Synchronization step leads to restrict to the set of strategies such that ωi,j=ωσ(i),σ(j), ∀σ∈n, in other words strategies invariant by common permutation on i0,j0. which both lead to the restricted set of strategies Ω#:
Ω#={ω∈[0,1]2n3
[0,1]}
The step 4 is necessary to ensure that the opponent cannot take advantage of the independance between the selection of Φ and Φ′ by A and B, which could efficiently let him estimate
by using the strategy
Thanks to the synchronization step, such strategy becomes unefficient, because of the nature of the initial seed Φ0 used in the DRG(N, n, k). The repeated draws of Φ are used to synchronize Φ and Φ′, but they shouldn't help to gain knowledge on Φ. This is the role of dispersion in step 3.
It is important to remark that the calculation of σB=σB[{is}*,{ys}*] at step 4 only relies on the index s∈N*, so excluding 0. Indeed, the choice of σB must remain independant from i0, so that i0 and j0 remain draws of independant Bernouilli random variables, then allowing to apply the above upper bound (E) for the legitimate partners.
The explanation for this embodiment is the following: it can be proved that (the details are complex and are not presented in this description), whatever opponent's strategy ω in the restricted set Ω#:
where C′ is a constant. On the other hand, we still have:
and thus, provided that
an Advantage Distillation is obtained at step 5.
It is also obtained in the theoretical analysis that, N should be again roughly equal to ln (n!)˜n ln(n), to obtain a satisfying probability to match the synchronization criteria at step 4 with the choice of σB.
An industrial embodiment of a Perfect Secrecy Protocol enables two entities communicating over an insecure communication channel, to generate commonly and exclusively a secure shared information. This information, that can be of size as long as desired (repetition of the protocol); it can be used to exchange securely a meaningful message between the legitimate partners or directly (one time pad XOR) or by exchanging a symmetric cryptographic key applicable with any block or stream cipher.
Thus it can be used to secure very sensitive communication for which the security of unproven cryptographic methods may appear as not sufficient.
Such embodiment can be performed under the shape of software programs, that can be embedded in communication devices or IT applications. It can also be embedded in dedicated cut-through tamper resistant secure communication devices.
| Number | Date | Country | Kind |
|---|---|---|---|
| 15 00759 | Apr 2015 | FR | national |
| Filing Document | Filing Date | Country | Kind |
|---|---|---|---|
| PCT/FR2016/000070 | 4/6/2016 | WO | 00 |
| Publishing Document | Publishing Date | Country | Kind |
|---|---|---|---|
| WO2016/166426 | 10/20/2016 | WO | A |
| Number | Name | Date | Kind |
|---|---|---|---|
| 20050038638 | Comaniciu | Feb 2005 | A1 |
| 20140187427 | Macready | Jul 2014 | A1 |
| 20140279737 | Horvitz | Sep 2014 | A1 |
| Number | Date | Country |
|---|---|---|
| 3002349 | Aug 2014 | FR |
| Entry |
|---|
| Payandeh, A., M. Ahmadian, and M. Reza Aref. “Adaptive secure channel coding based on punctured turbo codes.” IEE Proceedings-Communications 153.2 (2006): 313-316. (Year: 2006). |
| Castro, Miguel, et al. “Secure routing for structured peer-to-peer overlay networks.” ACM SIGOPS Operating Systems Review 36.SI (2002): 299-314. (Year: 2002). |
| Bernstein, Greg Maurice, and Michael A. Lieberman. “Secure random number generation using chaotic circuits.” IEEE Transactions on Circuits and Systems 37.9 (1990): 1157-1164. (Year: 1990). |
| Shafi, Goldwasser, and Silvio Micali. “Probabilistic encryption.” Journal of computer and system sciences 28.2 (1984): 270-299. (Year: 1984). |
| Thibault De Val roger: “Perfect Secrecy under Deep Random assumption”, Jul. 29, 2015 (Jul. 29, 2015), XP055255573, Retrieved from the Internet: URL:http://arxiv.org/ftp/arxiv/papers/1507/1507.08258.pdf [retrieved on Mar. 4, 2016] paragraphs [OOOI]. [OIII]. |
| Khiabani Yahya Sowti et al: “Exponent i al secrecy against unbounded adversary using joint encryption and privacy amplification”, 2013 IEEE Conference on Communications and Network Security (CNS),IEEE, Oct. 14, 2013 (Oct. 14, 2013), pp. 198-206, XP032529027,DOI: 10.1109/CNS.2013.6682708 paragraphs [OOOI], [OOIV], [OOOV]. |
| Yahya Sowti et al:“Achievable Secrecy Enhancement Through Joint Encryption and Privacy Amplification”, Jan. 1, 2007 (Jan. 1, 2007), XP055255973, Retrieved from the Internet: URL:http://etd.lsu.edu/docs/available/etd- 06042013-134734/unrestricted/Diss_Sowti_ Yahya.pdf paragraphs [01. 2], [01. 6], [01. 7], [02.4]. [03.2]. [03.3] paragraph [0004]. |
| Yahya Sowti Khiabani et al:“ARQ-Based Symmetric-Key Generation Over Correlated Erasure Channels”, IEEE Transactions on Information Forensics and Security, IEEE, Piscataway, NJ, US, vol. 8, No. 7, Jul. 1, 2013 (Jul. 1, 2013), pp. 1152-1161, XP011514862, ISSN: 1556-6013, DOI: 10.1109/TIFS.2013.2264461 paragraph [OOOI]—paragraph [OOIV]. |
| Masahito Hayashi: “Exponential decreasing rate of leaked information in universal random privacy amplification”, arxiv.org, Cornell University Library, 201 Olin Library Cornell University Ithaca, NY 14853, Apr. 2, 2009 (Apr. 2, 2009), XP080318076, paragraph [OOII]. |
| Ishai Yet al: “Extracting Correlations”, Foundations of Computer Science, 2009. FOCS '09. 50th Annual IEEE Symposium on, IEEE, Piscataway, NJ, USA, Oct. 25, 2009 (Oct. 25, 2009), pp. 261-270, XP031653199, ISBN: 978-14244-5116-6 paragraph [OOOI] paragraph [0004]. |
| U. Maurer et al: “Secret-key agreement over unauthenticated public channels-part III: privacy amplification”, IEEE Transactions on Information Theory, vol. 49, No. 4, Apr. 1, 2003 (Apr. 1, 2003), pp. 839-851, XP055256222, USA ISSN: 0018-9448, DOI:10.1109/TIT.2003.809559 paragraph [OOII]. |
| Paul MB Vitanyi: “Randomness”, arxiv.org, Cornell University Library, 201 Olin Library Cornell University Ithaca, NY 14853, Oct. 8, 2001 (Oct. 8, 2001), XP080063589, paragraph [0003]. |
| Marcus Hutter: “Universal Algorithmic Intelligence: A mathematical top->down approach”, arxiv.org, Cornell University Library, 201 Olin Library Cornell University Ithaca, NY 14853, Jan. 20, 2007 (Jan. 20, 2007), XP080269648, paragraph [0003]. |
| Gerard Rauch: “Les groupes finis et leurs representation, Chapitre 3: Les theoremes de Sylow; le groupe symetrique” In: “Les groupes finis et leurs representation, Chapitre 3: Les theoremes de Sylow; le groupe symetrique”, Jan. 1, 2000 (Jan. 1, 2000), XP055140577, ISBN: 978-2-72-980180-9 pp. 25-38, paragraph [03.3]. |
| Jean-Etienne Rombaldi: “Propriete 2.2.3 L'ordre d'un kl . . . kr-cycle est egal au ppcm des ordres des cycles composant ce kl . . . kr-cycle.”, Jan. 9, 2012 (Jan. 9, 2012), XP055154081, Retrieved from the Internet: URL:http://www-fourier.ujf-grenoble.fr/ro mbaldi/Agreginterne/Orall/102.pdf [retrieved on Nov. 19, 2014] paragraphs [03.1]—[03.5], [03.9]. |
| International Search Report of PCT/FR2016/000070 dated Apr. 7, 2016. |
| Number | Date | Country | |
|---|---|---|---|
| 20180287781 A1 | Oct 2018 | US |