Generalized privacy amplification
From MaRDI portal
Publication:4880313
Recommendations
Cited in
(only showing first 100 items - show all)- Rate-adaptive reconciliation with polar coding for continuous-variable quantum key distribution
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
- Quantum security analysis via smoothing of Renyi entropy of order 2
- Distributions attaining secret key at a rate of the conditional mutual information
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Basics of secrecy coding
- Secure message transmission by public discussion: a brief survey
- QKD iterative information reconciliation based on LDPC codes
- Efficient mediated semi-quantum key distribution
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
- Linking information reconciliation and privacy amplification
- Privacy Amplification by Public Discussion
- An eavesdropping game with SINR as an objective function
- One-shot decoupling
- Relations between the observational entropy and Rényi information measures
- Criteria of key security
- Quantum authentication with key recycling
- Quantum key evolution and its applications
- Secrecy capacity in the four-state protocol of quantum key distribution
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- On the local leakage resilience of linear secret sharing schemes
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Semi-quantum key distribution using qudit systems and security proof
- The security analysis of quantum B92 protocol in collective-rotation noise channel
- A light-weight bit commitment protocol based on unpredictable channel noise
- Quantum key distribution based on interferometry and interaction-free measurement
- An efficient hybrid hash based privacy amplification algorithm for quantum key distribution
- Quantum key distribution using universal hash functions over finite fields
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- Limited resource semiquantum secret sharing
- Theory of Cryptography
- A practical protocol for three-party authenticated quantum key distribution
- Asynchronous Byzantine agreement with optimal resilience
- Higher-rate quantum key expansion scheme
- High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction
- Multiparty blind quantum computation protocol with deterministic mutual identity authentication
- Cryptographic encryption scheme based on metastable excited nuclei
- Limited resource semi-quantum secret sharing based on multi-level systems
- A Probabilistic Error-Correcting Scheme that Provides Partial Secrecy
- Long term confidentiality: a survey
- A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication
- Deterministic six states protocol for quantum communication
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Mosaics of combinatorial designs for information-theoretic security
- Semi-quantum key distribution robust against combined collective noise
- Securing QKD links in the full Hilbert space
- Relating different quantum generalizations of the conditional Rényi entropy
- Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise
- Amplifying Privacy in Privacy Amplification
- Error correcting codes, block designs, perfect secrecy and finite fields
- Privacy amplification with asymptotically optimal entropy loss
- Two-party quantum key agreement protocols under collective noise channel
- Privacy amplification for quantum key distribution
- The effect of side-information on smooth entropy.
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Quantum Key Distribution
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- scientific article; zbMATH DE number 2044521 (Why is no real title available?)
- Efficient asynchronous verifiable secret sharing and multiparty computation
- Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode
- Key expanding in measurement-device-independent quantum key distribution
- Efficient quantum secret sharing
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- Secure computation from leaky correlated randomness
- Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system
- Authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution without invoking the classical party's measurement capability
- Role of information theoretic uncertainty relations in quantum theory
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures
- Vulnerability of ``a novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography
- Unified view for notions of bit security
- Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange
- Quantum cryptography over underground optical fibers
- Cryptography from one-way communication: on completeness of finite channels
- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
- Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?
- Composable security of unidimensional continuous-variable quantum key distribution
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Leakage-resilient key exchange and two-seed extractors
- Operational interpretation of the sandwiched Rényi divergence of order 1/2 to 1 as strong converse exponents
- Quantum computation: a tutorial
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Secure communication in the twin paradox
- Self-similar solutions of Rényi's entropy and the concavity of its entropy power
- Study on the security of the authentication scheme with key recycling in QKD
- Cryptography with One-Way Communication
- Quantum key distribution using a two-way quantum channel
- Using quantum key distribution for cryptographic purposes: a survey
- Quantum key distribution based on the quantum eraser
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Experimental quantum cryptography.
- Better short-seed quantum-proof extractors
- Mediated Semi‐Quantum Key Distribution Using Single Photons
- THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT
- A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography
- A Lightweight Key Agreement Protocol with Authentication Capability
- An Improved Robust Fuzzy Extractor
- Quantum key distribution using sequential weak values
This page was built for publication: Generalized privacy amplification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4880313)