Near-optimal extractors against quantum storage
DOI10.1145/1806689.1806713zbMATH Open1293.68128arXiv0911.4680OpenAlexW2077372202WikidataQ59792831 ScholiaQ59792831MaRDI QIDQ2875142FDOQ2875142
Authors: Anindya De, Thomas Vidick
Publication date: 13 August 2014
Published in: Proceedings of the forty-second ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0911.4680
Recommendations
- Short seed extractors against quantum storage
- Short seed extractors against quantum storage
- The Bounded-Storage Model in the Presence of a Quantum Adversary
- Efficient and exact quantum compression
- Cryptography in the Bounded-Quantum-Storage Model
- Unconditional Security From Noisy Quantum Storage
- Two-source extractors secure against quantum adversaries
- Two-source extractors secure against quantum adversaries
- A quantum-proof non-malleable extractor. With application to privacy amplification against active quantum adversaries
- Lossless quantum data compression and quantum Kolmogorov complexity
Cryptography (94A60) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17) Quantum algorithms and complexity in the theory of computing (68Q12) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cited In (14)
- Title not available (Why is that?)
- Quantum to classical randomness extractors
- From graphs to keyed quantum hash functions
- The Bounded-Storage Model in the Presence of a Quantum Adversary
- Semidefinite programs for randomness extractors
- Short seed extractors against quantum storage
- Better short-seed quantum-proof extractors
- A modular framework for quantum-proof randomness extractors
- Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round
- Trevisan's extractor in the presence of quantum side information
- Short seed extractors against quantum storage
- Optimal bounds for parity-oblivious random access codes
- Two-source extractors secure against quantum adversaries
- Two-source extractors secure against quantum adversaries
This page was built for publication: Near-optimal extractors against quantum storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2875142)