Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices
DOI10.1145/2885493zbMATH Open1407.94143arXiv1402.0489OpenAlexW2535210057WikidataQ130920921 ScholiaQ130920921MaRDI QIDQ3177810FDOQ3177810
Authors: Carl A. Miller, Yaoyun Shi
Publication date: 2 August 2018
Published in: Journal of the ACM, Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1402.0489
Recommendations
uncertainty principlequantum cryptographykey distributionprivacyrandomness extractionnonlocal gamesrandomness expansionuntrusted devicerandom-number generation
Cites Work
- Theory of Cryptography
- On the geometry of differential privacy
- Interactive privacy via the median mechanism
- The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
- Lower bounds in differential privacy
- Iterative Constructions and Private Data Release
- Differential privacy and the fat-shattering dimension of linear queries
- Our Data, Ourselves: Privacy Via Distributed Noise Generation
- On the complexity of differentially private data release, efficient algorithms and hardness results
- Title not available (Why is that?)
- Collusion-secure fingerprinting for digital data
- Advances in Cryptology – CRYPTO 2004
- Title not available (Why is that?)
- New Efficient Attacks on Statistical Disclosure Control Mechanisms
- Bounds on the sample complexity for private learning and private data release
- Answering \(n^{2+o(1)}\) counting queries with differential privacy is hard
- Characterizing the sample complexity of private learners
- Faster algorithms for privately releasing marginals
- Faster private release of marginals on small databases
- Private Learning and Sanitization: Pure vs. Approximate Differential Privacy
- Efficient algorithms for privately releasing marginals via convex relaxations
Uses Software
This page was built for publication: Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3177810)