Privacy Amplification by Public Discussion

From MaRDI portal
Revision as of 13:32, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3787912

DOI10.1137/0217014zbMath0644.94010OpenAlexW2007661134WikidataQ56389430 ScholiaQ56389430MaRDI QIDQ3787912

Gilles Brassard, Jean-Marc Robert, Charles H. Bennett

Publication date: 1988

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/594dfbdf3e3ba9df94a31ab9cb1e23912773b98a




Related Items (only showing first 100 items - show all)

Asymptotically optimal prepare-measure quantum key distribution protocolMediated Semi‐Quantum Key Distribution Without Invoking Quantum MeasurementMediated Semi‐Quantum Key Distribution Using Single PhotonsShort leakage resilient and non-malleable secret sharing schemesSome classes of balanced functions over finite fields with a small value of the linear characteristicOn the complexity of approximating the VC dimension.Cryptographic encryption scheme based on metastable excited nucleiCombinatorial techniques for universal hashingSemantic security for quantum wiretap channelsSecure computation from one-way noisy communication, or: anti-correlation via anti-concentrationCorrelation immunity and resiliency of symmetric Boolean functionsAuthentication codes based on resilient Boolean mapsCryptography with One-Way CommunicationSecure Computation from Leaky Correlated RandomnessAn infinite class of counterexamples to a conjecture concerning nonlinear resilient functionsError correcting codes, block designs, perfect secrecy and finite fieldsBasics of Secrecy CodingExperimental quantum cryptography.Variation on correlation immune Boolean and vectorial functionsLinking information reconciliation and privacy amplificationOn the existence of statistically hiding bit commitment schemes and fail-stop signaturesA modular framework for quantum-proof randomness extractorsSecrecy capacity in the four-state protocol of quantum key distributionSimulating BPP using a general weak random sourceAuthenticated semi-quantum key distribution protocol using Bell statesPrivacy amplification from non-malleable codesThe impossibility of non-signaling privacy amplificationQuantum cryptography without public announcement of basesSimple analysis of security of the BB84 quantum key distribution protocolComputational fuzzy extractor from LWEWhen Are Fuzzy Extractors Possible?Construction and count of 1-resilient rotation symmetric Boolean functions\(t\)-resilient functions and the partial exposure problemUnnamed ItemSemi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogueCryptography from one-way communication: on completeness of finite channelsFuzzy asymmetric password-authenticated key exchangeQuantum cryptography: Protecting our future networks with quantum mechanicsConstruction of highly nonlinear resilient S-boxes with given degreeBell state entanglement swappings over collective noises and their applications on quantum cryptographySECURITY OF QUANTUM KEY DISTRIBUTIONFault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channelsEntanglement distribution between quantum repeater nodes with an absorptive type memoryComputational fuzzy extractorsTwo results on the bit extraction problemLong term confidentiality: a surveyAn Improved Robust Fuzzy ExtractorQuantum key distribution using a two-way quantum channelTrojan horse attack free fault-tolerant quantum key distribution protocolsDeterministic extractors for small-space sourcesAn operational characterization of mutual information in algorithmic information theoryA note on a conjecture concerning symmetric resilient functionsA practical protocol for three-party authenticated quantum key distributionA note on a conjecture concerning symmetric resilient functionsConditionally-perfect secrecy and a provably-secure randomized cipherA quantum algorithm for testing and learning resiliency of a Boolean functionSecure Message Transmission by Public Discussion: A Brief SurveySemi-quantum key distribution robust against combined collective noiseАсимптотические оценки для чисел двоичных отображений с заданными криптографическими свойствамиQUANTUM KEY EVOLUTION AND ITS APPLICATIONSCryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding modeHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionHigh-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers codingTwo-party quantum key agreement protocols under collective noise channelTHE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENTAsynchronous Byzantine agreement with optimal resilienceControllable quantum private queries using an entangled Fibonacci-sequence spiral sourceOn extractors and exposure‐resilient functions for sublogarithmic entropyPrivacy amplification with asymptotically optimal entropy lossQuantum cryptographyThe generalized XOR lemmaOptimal Reductions Between Oblivious Transfers Using Interactive HashingEfficient asynchronous verifiable secret sharing and multiparty computationThe smooth entropy formalism for von Neumann algebrasUnnamed ItemA Less Known Side of Quantum CryptographyOn the local leakage resilience of linear secret sharing schemesSecrecy Without Perfect Randomness: Cryptography with (Bounded) Weak SourcesReusable fuzzy extractors for low-entropy distributionsReusable fuzzy extractor from the decisional Diffie-Hellman assumptionQuantum computation and quantum information†Three characterizations of non-binary correlation-immune and resilient functionsStrong converse theorems using Rényi entropiesA linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing schemeSeveral classes of even-variable 1-resilient rotation symmetric Boolean functions with high algebraic degree and nonlinearityBetter short-seed quantum-proof extractorsVULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY"Duality of privacy amplification against quantum adversaries and data compression with quantum side informationOn the constructions and nonlinearity of binary vector-output correlation-immune functionsA Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal StretchCryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noiseEfficient mediated semi-quantum key distributionConstruction of high degree resilient S-boxes with improved nonlinearitySimulation of a Random Variable and its Application to Game TheorySimple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy AmplificationQuantum Cryptography Using Polarization FeedbackQuantum Cryptography with Interferometric Quantum EntanglementQuantum cryptography using any two nonorthogonal statesHighly nonlinear resilient functions through disjoint codes in projective spaces.Leakage-resilient key exchange and two-seed extractors







This page was built for publication: Privacy Amplification by Public Discussion