Duality of privacy amplification against quantum adversaries and data compression with quantum side information
From MaRDI portal
Publication:3104821
DOI10.1098/rspa.2010.0445zbMath1228.81108arXiv1003.0703OpenAlexW2004820318WikidataQ59453562 ScholiaQ59453562MaRDI QIDQ3104821
Publication date: 17 December 2011
Published in: Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1003.0703
Authentication, digital signatures and secret sharing (94A62) Quantum information, communication, networks (quantum-theoretic aspects) (81P45)
Related Items
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths ⋮ The smooth entropy formalism for von Neumann algebras ⋮ Strong converse theorems using Rényi entropies
Cites Work
- On the Power of Quantum Memory
- The mother of all protocols: restructuring quantum information’s family tree
- Privacy Amplification by Public Discussion
- The Operational Meaning of Min- and Max-Entropy
- A Fully Quantum Asymptotic Equipartition Property
- Distillation of secret key and entanglement from quantum states
- Noiseless coding of correlated information sources