Secure identification and QKD in the bounded-quantum-storage model
From MaRDI portal
Publication:477165
DOI10.1016/J.TCS.2014.09.014zbMath1306.81031OpenAlexW2045152465MaRDI QIDQ477165
Serge Fehr, Louis Salvail, Christian Schaffner, Ivan B. Damgård
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2014.09.014
Cryptography (94A60) Information storage and retrieval of data (68P20) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improving the Security of Quantum Protocols via Commit-and-Open
- The existence of binary linear concatenated codes with Reed - Solomon outer codes which asymptotically meet the Gilbert- Varshamov bound
- An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification
- Correcting errors without leaking partial information
- Composing Quantum Protocols in a Classical Environment
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Everlasting security in the bounded storage model
- The Operational Meaning of Min- and Max-Entropy
- Unconditional Security From Noisy Quantum Storage
- Advances in Cryptology - EUROCRYPT 2004
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Statistical Security Conditions for Two-Party Secure Function Evaluation
- Theory of Cryptography
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
This page was built for publication: Secure identification and QKD in the bounded-quantum-storage model