Key agreement from weak bit agreement
From MaRDI portal
Publication:3581457
DOI10.1145/1060590.1060689zbMath1192.94099MaRDI QIDQ3581457
Publication date: 16 August 2010
Published in: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1060590.1060689
Related Items
Basing Weak Public-Key Cryptography on Strong One-Way Functions, Degradation and Amplification of Computational Hardness, A counterexample to the chain rule for conditional HILL entropy, Complexity of hard-core set proofs, Improved direct product theorems for randomized query complexity, Chernoff-type direct product theorems, Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy, Computational Randomness from Generalized Hardcore Sets, Simultaneous Secrecy and Reliability Amplification for a General Channel Model, A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch