Generalized privacy amplification
From MaRDI portal
Publication:4880313
DOI10.1109/18.476316zbMath0856.94018OpenAlexW2154300278WikidataQ56610500 ScholiaQ56610500MaRDI QIDQ4880313
Claude Crépeau, Ueli M. Maurer, Gilles Brassard, Charles H. Bennett
Publication date: 25 February 1997
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/727ed75b22520485daa02dddb53457d8bd06d603
cryptographyunconditional securityuniversal hashingRényi entropyprivacy amplificationsecret-key agreement
Related Items (only showing first 100 items - show all)
Quantum key distribution based on interferometry and interaction-free measurement ⋮ Cryptographic encryption scheme based on metastable excited nuclei ⋮ Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration ⋮ Efficient quantum secret sharing ⋮ Self-similar solutions of Rényi's entropy and the concavity of its entropy power ⋮ Quantum Cryptography over Underground Optical Fibers ⋮ Role of information theoretic uncertainty relations in quantum theory ⋮ Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2 ⋮ Cryptography with One-Way Communication ⋮ Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information ⋮ Secure Computation from Leaky Correlated Randomness ⋮ Error correcting codes, block designs, perfect secrecy and finite fields ⋮ Basics of Secrecy Coding ⋮ Study on the security of the authentication scheme with key recycling in QKD ⋮ Experimental quantum cryptography. ⋮ Relating different quantum generalizations of the conditional Rényi entropy ⋮ Linking information reconciliation and privacy amplification ⋮ Composable security of unidimensional continuous-variable quantum key distribution ⋮ On the existence of statistically hiding bit commitment schemes and fail-stop signatures ⋮ Secrecy capacity in the four-state protocol of quantum key distribution ⋮ Channels of small log-ratio leakage and characterization of two-party differentially private computation ⋮ Authenticated semi-quantum key distribution protocol using Bell states ⋮ Privacy amplification from non-malleable codes ⋮ A Probabilistic Error-Correcting Scheme that Provides Partial Secrecy ⋮ Secure communication in the twin paradox ⋮ QKD iterative information reconciliation based on LDPC codes ⋮ Novel reconciliation protocol based on spinal code for continuous-variable quantum key distribution ⋮ Novel encoding-decoding procedure for quantum key distribution ⋮ Rate-adaptive reconciliation with polar coding for continuous-variable quantum key distribution ⋮ An improved QKD protocol without public announcement basis using periodically derived basis ⋮ Unnamed Item ⋮ Cryptography from one-way communication: on completeness of finite channels ⋮ Bell state entanglement swappings over collective noises and their applications on quantum cryptography ⋮ SECURITY OF QUANTUM KEY DISTRIBUTION ⋮ The effect of side-information on smooth entropy. ⋮ Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels ⋮ Long term confidentiality: a survey ⋮ Quantum computation: a tutorial ⋮ An Improved Robust Fuzzy Extractor ⋮ A light-weight bit commitment protocol based on unpredictable channel noise ⋮ Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths ⋮ One-shot decoupling ⋮ Quantum key distribution using a two-way quantum channel ⋮ Using quantum key distribution for cryptographic purposes: a survey ⋮ Trojan horse attack free fault-tolerant quantum key distribution protocols ⋮ Key-leakage evaluation of authentication in quantum key distribution with finite resources ⋮ Quantum key distribution using sequential weak values ⋮ Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ Deterministic six states protocol for quantum communication ⋮ Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure? ⋮ Secure Message Transmission by Public Discussion: A Brief Survey ⋮ Semiquantum key distribution without invoking the classical party's measurement capability ⋮ Semi-quantum key distribution robust against combined collective noise ⋮ Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna ⋮ An Eavesdropping Game with SINR as an Objective Function ⋮ A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication ⋮ Критерии секретности ключа ⋮ QUANTUM KEY EVOLUTION AND ITS APPLICATIONS ⋮ Key expanding in measurement-device-independent quantum key distribution ⋮ Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode ⋮ Quantum Key Distribution ⋮ Two-party quantum key agreement protocols under collective noise channel ⋮ Limited resource semiquantum secret sharing ⋮ THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT ⋮ Asynchronous Byzantine agreement with optimal resilience ⋮ Privacy amplification with asymptotically optimal entropy loss ⋮ Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis ⋮ Quantum cryptography ⋮ Optimal Reductions Between Oblivious Transfers Using Interactive Hashing ⋮ Efficient asynchronous verifiable secret sharing and multiparty computation ⋮ The smooth entropy formalism for von Neumann algebras ⋮ On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles ⋮ Statistical inference for the \(\epsilon \)-entropy and the quadratic Rényi entropy ⋮ A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage ⋮ Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker ⋮ On the local leakage resilience of linear secret sharing schemes ⋮ Reusable fuzzy extractor from the decisional Diffie-Hellman assumption ⋮ Lattice-based treshold-changeability for standard CRT secret-sharing schemes ⋮ Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker ⋮ Quantum information with continuous variables ⋮ A two-dimensional quantum key distribution protocol based on polarization-phase encoding ⋮ Better short-seed quantum-proof extractors ⋮ VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY" ⋮ Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise ⋮ Limited resource semi-quantum secret sharing based on multi-level systems ⋮ The security analysis of quantum B92 protocol in collective-rotation noise channel ⋮ Efficient mediated semi-quantum key distribution ⋮ Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification ⋮ Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system ⋮ Securing QKD links in the full Hilbert space ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Relations between the observational entropy and Rényi information measures ⋮ Quantum key distribution using universal hash functions over finite fields ⋮ Higher-rate quantum key expansion scheme ⋮ High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction ⋮ Multiparty blind quantum computation protocol with deterministic mutual identity authentication ⋮ Quantum Authentication with Key Recycling ⋮ Mosaics of combinatorial designs for information-theoretic security ⋮ Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
This page was built for publication: Generalized privacy amplification