Generalized privacy amplification
From MaRDI portal
Publication:4880313
Recommendations
Cited in
(only showing first 100 items - show all)- Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise
- An improved QKD protocol without public announcement basis using periodically derived basis
- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
- Short leakage resilient and non-malleable secret sharing schemes
- A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
- Cryptography from one-way communication: on completeness of finite channels
- Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system
- Mosaics of combinatorial designs for information-theoretic security
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Seven definitions of bipartite bound entanglement
- Novel reconciliation protocol based on spinal code for continuous-variable quantum key distribution
- Novel encoding-decoding procedure for quantum key distribution
- Rate-adaptive reconciliation with polar coding for continuous-variable quantum key distribution
- Efficient information reconciliation in quantum key distribution systems using informed design of non-binary LDPC codes
- Limited resource semiquantum secret sharing
- scientific article; zbMATH DE number 2044521 (Why is no real title available?)
- Privacy amplification from non-malleable codes
- Cryptography with One-Way Communication
- Mediated Semi‐Quantum Key Distribution Using Single Photons
- Unified view for notions of bit security
- The security analysis of quantum B92 protocol in collective-rotation noise channel
- On the local leakage resilience of linear secret sharing schemes
- Efficient mediated semi-quantum key distribution
- Quantum security analysis via smoothing of Renyi entropy of order 2
- Distributions attaining secret key at a rate of the conditional mutual information
- Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker
- Basics of secrecy coding
- An eavesdropping game with SINR as an objective function
- Higher-rate quantum key expansion scheme
- High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction
- Multiparty blind quantum computation protocol with deterministic mutual identity authentication
- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification
- Long term confidentiality: a survey
- Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna
- A Lightweight Key Agreement Protocol with Authentication Capability
- A Probabilistic Error-Correcting Scheme that Provides Partial Secrecy
- Channels of small log-ratio leakage and characterization of two-party differentially private computation
- QKD iterative information reconciliation based on LDPC codes
- Privacy amplification with asymptotically optimal entropy loss
- Limited resource semi-quantum secret sharing based on multi-level systems
- Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode
- Key expanding in measurement-device-independent quantum key distribution
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- Criteria of key security
- Efficient asynchronous verifiable secret sharing and multiparty computation
- An efficient hybrid hash based privacy amplification algorithm for quantum key distribution
- Quantum key distribution using universal hash functions over finite fields
- Quantum key distribution based on the quantum eraser
- Relations between the observational entropy and Rényi information measures
- Operational interpretation of the sandwiched Rényi divergence of order 1/2 to 1 as strong converse exponents
- Privacy amplification for quantum key distribution
- The smooth entropy formalism for von Neumann algebras
- Authenticated semi-quantum key distribution protocol using Bell states
- Amplifying Privacy in Privacy Amplification
- Cryptographic encryption scheme based on metastable excited nuclei
- Quantum computation: a tutorial
- An Improved Robust Fuzzy Extractor
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Quantum authentication with key recycling
- Secure communication in the twin paradox
- Deterministic six states protocol for quantum communication
- Better short-seed quantum-proof extractors
- Linking information reconciliation and privacy amplification
- Asynchronous Byzantine agreement with optimal resilience
- Securing QKD links in the full Hilbert space
- Privacy Amplification by Public Discussion
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography
- A two-dimensional quantum key distribution protocol based on polarization-phase encoding
- Quantum Key Distribution
- A light-weight bit commitment protocol based on unpredictable channel noise
- Renyi entropy estimation revisited
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Relating different quantum generalizations of the conditional Rényi entropy
- Composable security of unidimensional continuous-variable quantum key distribution
- Self-similar solutions of Rényi's entropy and the concavity of its entropy power
- Secrecy capacity in the four-state protocol of quantum key distribution
- Quantum information with continuous variables
- Semiquantum key distribution without invoking the classical party's measurement capability
- Leakage-resilient key exchange and two-seed extractors
- The effect of side-information on smooth entropy.
- Quantum cryptography
- Two-party quantum key agreement protocols under collective noise channel
- Quantum cryptography over underground optical fibers
- Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- Error correcting codes, block designs, perfect secrecy and finite fields
- Quantum key evolution and its applications
- THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
- Semi-quantum key distribution using qudit systems and security proof
- Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange
- A practical protocol for three-party authenticated quantum key distribution
- Statistical inference for the \(\epsilon \)-entropy and the quadratic Rényi entropy
- Semi-quantum key distribution robust against combined collective noise
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Role of information theoretic uncertainty relations in quantum theory
- Experimental quantum cryptography.
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
This page was built for publication: Generalized privacy amplification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4880313)