Secure identification and QKD in the bounded-quantum-storage model
From MaRDI portal
Publication:477165
DOI10.1016/J.TCS.2014.09.014zbMATH Open1306.81031OpenAlexW2045152465MaRDI QIDQ477165FDOQ477165
Authors: Serge Fehr, Louis Salvail, Christian Schaffner, Ivan B. Damgård
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.09.014
Recommendations
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Quantum identification protocol with technologically bounded parties
- Cryptography in the Bounded-Quantum-Storage Model
- Secure Authentication from a Weak Key, without Leaking Information
- Improving the Security of Quantum Protocols via Commit-and-Open
Information storage and retrieval of data (68P20) Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Theory of Cryptography
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- The Operational Meaning of Min- and Max-Entropy
- A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
- Title not available (Why is that?)
- Everlasting security in the bounded storage model
- Improving the Security of Quantum Protocols via Commit-and-Open
- The existence of binary linear concatenated codes with Reed - Solomon outer codes which asymptotically meet the Gilbert- Varshamov bound
- Robust cryptography in the noisy-quantum-storage model
- An all-but-one entropic uncertainty relation, and application to password-based identification
- Correcting errors without leaking partial information
- Composing Quantum Protocols in a Classical Environment
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Title not available (Why is that?)
- Unconditional Security From Noisy Quantum Storage
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Statistical Security Conditions for Two-Party Secure Function Evaluation
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Cited In (8)
- Quantum identification protocol with technologically bounded parties
- Title not available (Why is that?)
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Title not available (Why is that?)
- Unconditionally-secure and reusable public-key authentication
- Memory-sample lower bounds for learning with classical-quantum hybrid memory
- An all-but-one entropic uncertainty relation, and application to password-based identification
- Title not available (Why is that?)
This page was built for publication: Secure identification and QKD in the bounded-quantum-storage model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477165)