Privacy Amplification by Public Discussion

From MaRDI portal
Publication:3787912

DOI10.1137/0217014zbMath0644.94010OpenAlexW2007661134WikidataQ56389430 ScholiaQ56389430MaRDI QIDQ3787912

Gilles Brassard, Jean-Marc Robert, Charles H. Bennett

Publication date: 1988

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/594dfbdf3e3ba9df94a31ab9cb1e23912773b98a



Related Items

Asymptotically optimal prepare-measure quantum key distribution protocol, Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement, Mediated Semi‐Quantum Key Distribution Using Single Photons, Short leakage resilient and non-malleable secret sharing schemes, Some classes of balanced functions over finite fields with a small value of the linear characteristic, On the complexity of approximating the VC dimension., Cryptographic encryption scheme based on metastable excited nuclei, Combinatorial techniques for universal hashing, Semantic security for quantum wiretap channels, Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration, Correlation immunity and resiliency of symmetric Boolean functions, Authentication codes based on resilient Boolean maps, Cryptography with One-Way Communication, Secure Computation from Leaky Correlated Randomness, An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions, Error correcting codes, block designs, perfect secrecy and finite fields, Basics of Secrecy Coding, Experimental quantum cryptography., Variation on correlation immune Boolean and vectorial functions, Linking information reconciliation and privacy amplification, On the existence of statistically hiding bit commitment schemes and fail-stop signatures, A modular framework for quantum-proof randomness extractors, Secrecy capacity in the four-state protocol of quantum key distribution, Simulating BPP using a general weak random source, Authenticated semi-quantum key distribution protocol using Bell states, Privacy amplification from non-malleable codes, The impossibility of non-signaling privacy amplification, Quantum cryptography without public announcement of bases, Simple analysis of security of the BB84 quantum key distribution protocol, Computational fuzzy extractor from LWE, When Are Fuzzy Extractors Possible?, Construction and count of 1-resilient rotation symmetric Boolean functions, \(t\)-resilient functions and the partial exposure problem, Unnamed Item, Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue, Cryptography from one-way communication: on completeness of finite channels, Fuzzy asymmetric password-authenticated key exchange, Quantum cryptography: Protecting our future networks with quantum mechanics, Construction of highly nonlinear resilient S-boxes with given degree, Bell state entanglement swappings over collective noises and their applications on quantum cryptography, SECURITY OF QUANTUM KEY DISTRIBUTION, Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels, Entanglement distribution between quantum repeater nodes with an absorptive type memory, Computational fuzzy extractors, Two results on the bit extraction problem, Long term confidentiality: a survey, An Improved Robust Fuzzy Extractor, Quantum key distribution using a two-way quantum channel, Trojan horse attack free fault-tolerant quantum key distribution protocols, Deterministic extractors for small-space sources, An operational characterization of mutual information in algorithmic information theory, A note on a conjecture concerning symmetric resilient functions, A practical protocol for three-party authenticated quantum key distribution, A note on a conjecture concerning symmetric resilient functions, Conditionally-perfect secrecy and a provably-secure randomized cipher, A quantum algorithm for testing and learning resiliency of a Boolean function, Secure Message Transmission by Public Discussion: A Brief Survey, Semi-quantum key distribution robust against combined collective noise, Асимптотические оценки для чисел двоичных отображений с заданными криптографическими свойствами, QUANTUM KEY EVOLUTION AND ITS APPLICATIONS, Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode, HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption, High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding, Two-party quantum key agreement protocols under collective noise channel, THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT, Asynchronous Byzantine agreement with optimal resilience, Controllable quantum private queries using an entangled Fibonacci-sequence spiral source, On extractors and exposure‐resilient functions for sublogarithmic entropy, Privacy amplification with asymptotically optimal entropy loss, Quantum cryptography, The generalized XOR lemma, Optimal Reductions Between Oblivious Transfers Using Interactive Hashing, Efficient asynchronous verifiable secret sharing and multiparty computation, The smooth entropy formalism for von Neumann algebras, Unnamed Item, A Less Known Side of Quantum Cryptography, On the local leakage resilience of linear secret sharing schemes, Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources, Reusable fuzzy extractors for low-entropy distributions, Reusable fuzzy extractor from the decisional Diffie-Hellman assumption, Quantum computation and quantum information†, Three characterizations of non-binary correlation-immune and resilient functions, Strong converse theorems using Rényi entropies, A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme, Several classes of even-variable 1-resilient rotation symmetric Boolean functions with high algebraic degree and nonlinearity, Better short-seed quantum-proof extractors, VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY", Duality of privacy amplification against quantum adversaries and data compression with quantum side information, On the constructions and nonlinearity of binary vector-output correlation-immune functions, A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch, Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise, Efficient mediated semi-quantum key distribution, Construction of high degree resilient S-boxes with improved nonlinearity, Simulation of a Random Variable and its Application to Game Theory, Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification, Quantum Cryptography Using Polarization Feedback, Quantum Cryptography with Interferometric Quantum Entanglement, Quantum cryptography using any two nonorthogonal states, Highly nonlinear resilient functions through disjoint codes in projective spaces., Leakage-resilient key exchange and two-seed extractors, Error correction in quantum cryptography based on artificial neural networks, Non-malleability against polynomial tampering, An efficient hybrid hash based privacy amplification algorithm for quantum key distribution, High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction, Mosaics of combinatorial designs for information-theoretic security