Generalized privacy amplification

From MaRDI portal
Revision as of 04:53, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4880313

DOI10.1109/18.476316zbMath0856.94018OpenAlexW2154300278WikidataQ56610500 ScholiaQ56610500MaRDI QIDQ4880313

Claude Crépeau, Ueli M. Maurer, Gilles Brassard, Charles H. Bennett

Publication date: 25 February 1997

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/727ed75b22520485daa02dddb53457d8bd06d603




Related Items (only showing first 100 items - show all)

Quantum key distribution based on interferometry and interaction-free measurementCryptographic encryption scheme based on metastable excited nucleiSecure computation from one-way noisy communication, or: anti-correlation via anti-concentrationEfficient quantum secret sharingSelf-similar solutions of Rényi's entropy and the concavity of its entropy powerQuantum Cryptography over Underground Optical FibersRole of information theoretic uncertainty relations in quantum theoryQuantum Security Analysis via Smoothing of Renyi Entropy of Order 2Cryptography with One-Way CommunicationDistributions Attaining Secret Key at a Rate of the Conditional Mutual InformationSecure Computation from Leaky Correlated RandomnessError correcting codes, block designs, perfect secrecy and finite fieldsBasics of Secrecy CodingStudy on the security of the authentication scheme with key recycling in QKDExperimental quantum cryptography.Relating different quantum generalizations of the conditional Rényi entropyLinking information reconciliation and privacy amplificationComposable security of unidimensional continuous-variable quantum key distributionOn the existence of statistically hiding bit commitment schemes and fail-stop signaturesSecrecy capacity in the four-state protocol of quantum key distributionChannels of small log-ratio leakage and characterization of two-party differentially private computationAuthenticated semi-quantum key distribution protocol using Bell statesPrivacy amplification from non-malleable codesA Probabilistic Error-Correcting Scheme that Provides Partial SecrecySecure communication in the twin paradoxQKD iterative information reconciliation based on LDPC codesNovel reconciliation protocol based on spinal code for continuous-variable quantum key distributionNovel encoding-decoding procedure for quantum key distributionRate-adaptive reconciliation with polar coding for continuous-variable quantum key distributionAn improved QKD protocol without public announcement basis using periodically derived basisUnnamed ItemCryptography from one-way communication: on completeness of finite channelsBell state entanglement swappings over collective noises and their applications on quantum cryptographySECURITY OF QUANTUM KEY DISTRIBUTIONThe effect of side-information on smooth entropy.Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channelsLong term confidentiality: a surveyQuantum computation: a tutorialAn Improved Robust Fuzzy ExtractorA light-weight bit commitment protocol based on unpredictable channel noiseConcise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengthsOne-shot decouplingQuantum key distribution using a two-way quantum channelUsing quantum key distribution for cryptographic purposes: a surveyTrojan horse attack free fault-tolerant quantum key distribution protocolsKey-leakage evaluation of authentication in quantum key distribution with finite resourcesQuantum key distribution using sequential weak valuesNotes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchangeA practical protocol for three-party authenticated quantum key distributionDeterministic six states protocol for quantum communicationResponse to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?Secure Message Transmission by Public Discussion: A Brief SurveySemiquantum key distribution without invoking the classical party's measurement capabilitySemi-quantum key distribution robust against combined collective noiseInformation Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR AntennaAn Eavesdropping Game with SINR as an Objective FunctionA hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communicationКритерии секретности ключаQUANTUM KEY EVOLUTION AND ITS APPLICATIONSKey expanding in measurement-device-independent quantum key distributionCryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding modeQuantum Key DistributionTwo-party quantum key agreement protocols under collective noise channelLimited resource semiquantum secret sharingTHE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENTAsynchronous Byzantine agreement with optimal resiliencePrivacy amplification with asymptotically optimal entropy lossComposable security against collective attacks of a modified BB84 QKD protocol with information only in one basisQuantum cryptographyOptimal Reductions Between Oblivious Transfers Using Interactive HashingEfficient asynchronous verifiable secret sharing and multiparty computationThe smooth entropy formalism for von Neumann algebrasOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesStatistical inference for the \(\epsilon \)-entropy and the quadratic Rényi entropyA joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakageRandomness Extraction Via δ-Biased Masking in the Presence of a Quantum AttackerOn the local leakage resilience of linear secret sharing schemesReusable fuzzy extractor from the decisional Diffie-Hellman assumptionLattice-based treshold-changeability for standard CRT secret-sharing schemesPrecise evaluation of leaked information with secure randomness extraction in the presence of quantum attackerQuantum information with continuous variablesA two-dimensional quantum key distribution protocol based on polarization-phase encodingBetter short-seed quantum-proof extractorsVULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY"Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noiseLimited resource semi-quantum secret sharing based on multi-level systemsThe security analysis of quantum B92 protocol in collective-rotation noise channelEfficient mediated semi-quantum key distributionSimple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy AmplificationEffect of channel imperfection on the secrecy capacity of a quantum cryptographic systemSecuring QKD links in the full Hilbert spaceLeakage-resilient key exchange and two-seed extractorsRelations between the observational entropy and Rényi information measuresQuantum key distribution using universal hash functions over finite fieldsHigher-rate quantum key expansion schemeHigh efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extractionMultiparty blind quantum computation protocol with deterministic mutual identity authenticationQuantum Authentication with Key RecyclingMosaics of combinatorial designs for information-theoretic securityMediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement







This page was built for publication: Generalized privacy amplification