Privacy Amplification by Public Discussion
From MaRDI portal
Publication:3787912
DOI10.1137/0217014zbMath0644.94010OpenAlexW2007661134WikidataQ56389430 ScholiaQ56389430MaRDI QIDQ3787912
Gilles Brassard, Jean-Marc Robert, Charles H. Bennett
Publication date: 1988
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/594dfbdf3e3ba9df94a31ab9cb1e23912773b98a
Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40)
Related Items (only showing first 100 items - show all)
Asymptotically optimal prepare-measure quantum key distribution protocol ⋮ Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement ⋮ Mediated Semi‐Quantum Key Distribution Using Single Photons ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ Some classes of balanced functions over finite fields with a small value of the linear characteristic ⋮ On the complexity of approximating the VC dimension. ⋮ Cryptographic encryption scheme based on metastable excited nuclei ⋮ Combinatorial techniques for universal hashing ⋮ Semantic security for quantum wiretap channels ⋮ Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration ⋮ Correlation immunity and resiliency of symmetric Boolean functions ⋮ Authentication codes based on resilient Boolean maps ⋮ Cryptography with One-Way Communication ⋮ Secure Computation from Leaky Correlated Randomness ⋮ An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions ⋮ Error correcting codes, block designs, perfect secrecy and finite fields ⋮ Basics of Secrecy Coding ⋮ Experimental quantum cryptography. ⋮ Variation on correlation immune Boolean and vectorial functions ⋮ Linking information reconciliation and privacy amplification ⋮ On the existence of statistically hiding bit commitment schemes and fail-stop signatures ⋮ A modular framework for quantum-proof randomness extractors ⋮ Secrecy capacity in the four-state protocol of quantum key distribution ⋮ Simulating BPP using a general weak random source ⋮ Authenticated semi-quantum key distribution protocol using Bell states ⋮ Privacy amplification from non-malleable codes ⋮ The impossibility of non-signaling privacy amplification ⋮ Quantum cryptography without public announcement of bases ⋮ Simple analysis of security of the BB84 quantum key distribution protocol ⋮ Computational fuzzy extractor from LWE ⋮ When Are Fuzzy Extractors Possible? ⋮ Construction and count of 1-resilient rotation symmetric Boolean functions ⋮ \(t\)-resilient functions and the partial exposure problem ⋮ Unnamed Item ⋮ Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue ⋮ Cryptography from one-way communication: on completeness of finite channels ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Quantum cryptography: Protecting our future networks with quantum mechanics ⋮ Construction of highly nonlinear resilient S-boxes with given degree ⋮ Bell state entanglement swappings over collective noises and their applications on quantum cryptography ⋮ SECURITY OF QUANTUM KEY DISTRIBUTION ⋮ Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels ⋮ Entanglement distribution between quantum repeater nodes with an absorptive type memory ⋮ Computational fuzzy extractors ⋮ Two results on the bit extraction problem ⋮ Long term confidentiality: a survey ⋮ An Improved Robust Fuzzy Extractor ⋮ Quantum key distribution using a two-way quantum channel ⋮ Trojan horse attack free fault-tolerant quantum key distribution protocols ⋮ Deterministic extractors for small-space sources ⋮ An operational characterization of mutual information in algorithmic information theory ⋮ A note on a conjecture concerning symmetric resilient functions ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ A note on a conjecture concerning symmetric resilient functions ⋮ Conditionally-perfect secrecy and a provably-secure randomized cipher ⋮ A quantum algorithm for testing and learning resiliency of a Boolean function ⋮ Secure Message Transmission by Public Discussion: A Brief Survey ⋮ Semi-quantum key distribution robust against combined collective noise ⋮ Асимптотические оценки для чисел двоичных отображений с заданными криптографическими свойствами ⋮ QUANTUM KEY EVOLUTION AND ITS APPLICATIONS ⋮ Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode ⋮ HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption ⋮ High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding ⋮ Two-party quantum key agreement protocols under collective noise channel ⋮ THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT ⋮ Asynchronous Byzantine agreement with optimal resilience ⋮ Controllable quantum private queries using an entangled Fibonacci-sequence spiral source ⋮ On extractors and exposure‐resilient functions for sublogarithmic entropy ⋮ Privacy amplification with asymptotically optimal entropy loss ⋮ Quantum cryptography ⋮ The generalized XOR lemma ⋮ Optimal Reductions Between Oblivious Transfers Using Interactive Hashing ⋮ Efficient asynchronous verifiable secret sharing and multiparty computation ⋮ The smooth entropy formalism for von Neumann algebras ⋮ Unnamed Item ⋮ A Less Known Side of Quantum Cryptography ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources ⋮ Reusable fuzzy extractors for low-entropy distributions ⋮ Reusable fuzzy extractor from the decisional Diffie-Hellman assumption ⋮ Quantum computation and quantum information† ⋮ Three characterizations of non-binary correlation-immune and resilient functions ⋮ Strong converse theorems using Rényi entropies ⋮ A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme ⋮ Several classes of even-variable 1-resilient rotation symmetric Boolean functions with high algebraic degree and nonlinearity ⋮ Better short-seed quantum-proof extractors ⋮ VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY" ⋮ Duality of privacy amplification against quantum adversaries and data compression with quantum side information ⋮ On the constructions and nonlinearity of binary vector-output correlation-immune functions ⋮ A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch ⋮ Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise ⋮ Efficient mediated semi-quantum key distribution ⋮ Construction of high degree resilient S-boxes with improved nonlinearity ⋮ Simulation of a Random Variable and its Application to Game Theory ⋮ Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification ⋮ Quantum Cryptography Using Polarization Feedback ⋮ Quantum Cryptography with Interferometric Quantum Entanglement ⋮ Quantum cryptography using any two nonorthogonal states ⋮ Highly nonlinear resilient functions through disjoint codes in projective spaces. ⋮ Leakage-resilient key exchange and two-seed extractors
This page was built for publication: Privacy Amplification by Public Discussion