Generalized privacy amplification
DOI10.1109/18.476316zbMATH Open0856.94018OpenAlexW2154300278WikidataQ56610500 ScholiaQ56610500MaRDI QIDQ4880313FDOQ4880313
Authors: Gilles Brassard, Claude Crépeau, Ueli M. Maurer, Charles H. Bennett
Publication date: 25 February 1997
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/727ed75b22520485daa02dddb53457d8bd06d603
Recommendations
cryptographyunconditional securityuniversal hashingprivacy amplificationsecret-key agreementRényi entropy
Cited In (only showing first 100 items - show all)
- A light-weight bit commitment protocol based on unpredictable channel noise
- Theory of Cryptography
- Quantum key distribution based on interferometry and interaction-free measurement
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- Asynchronous Byzantine agreement with optimal resilience
- A practical protocol for three-party authenticated quantum key distribution
- Cryptographic encryption scheme based on metastable excited nuclei
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication
- Deterministic six states protocol for quantum communication
- Semi-quantum key distribution robust against combined collective noise
- Securing QKD links in the full Hilbert space
- Relating different quantum generalizations of the conditional Rényi entropy
- Amplifying Privacy in Privacy Amplification
- Two-party quantum key agreement protocols under collective noise channel
- Error correcting codes, block designs, perfect secrecy and finite fields
- Quantum Key Distribution
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- The effect of side-information on smooth entropy.
- Efficient quantum secret sharing
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- Authenticated semi-quantum key distribution protocol using Bell states
- Semiquantum key distribution without invoking the classical party's measurement capability
- Title not available (Why is that?)
- Role of information theoretic uncertainty relations in quantum theory
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures
- Vulnerability of ``a novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography
- Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange
- Composable security of unidimensional continuous-variable quantum key distribution
- Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?
- Leakage-resilient key exchange and two-seed extractors
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Quantum computation: a tutorial
- Secure communication in the twin paradox
- Self-similar solutions of Rényi's entropy and the concavity of its entropy power
- Quantum Authentication with Key Recycling
- Study on the security of the authentication scheme with key recycling in QKD
- THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT
- Experimental quantum cryptography.
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Quantum key distribution using a two-way quantum channel
- Using quantum key distribution for cryptographic purposes: a survey
- Better short-seed quantum-proof extractors
- An Improved Robust Fuzzy Extractor
- A two-dimensional quantum key distribution protocol based on polarization-phase encoding
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography
- Secure Computation from Leaky Correlated Randomness
- Quantum key distribution using sequential weak values
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Quantum information with continuous variables
- Quantum cryptography
- Statistical inference for the \(\epsilon \)-entropy and the quadratic Rényi entropy
- The smooth entropy formalism for von Neumann algebras
- Quantum Cryptography over Underground Optical Fibers
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Secure message transmission by public discussion: a brief survey
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
- Linking information reconciliation and privacy amplification
- Privacy Amplification by Public Discussion
- One-shot decoupling
- Quantum key evolution and its applications
- Secrecy capacity in the four-state protocol of quantum key distribution
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- Semi-quantum key distribution using qudit systems and security proof
- SECURITY OF QUANTUM KEY DISTRIBUTION
- The security analysis of quantum B92 protocol in collective-rotation noise channel
- Quantum key distribution using universal hash functions over finite fields
- Limited resource semiquantum secret sharing
- Higher-rate quantum key expansion scheme
- High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction
- Multiparty blind quantum computation protocol with deterministic mutual identity authentication
- A Probabilistic Error-Correcting Scheme that Provides Partial Secrecy
- Limited resource semi-quantum secret sharing based on multi-level systems
- Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2
- Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information
- Basics of Secrecy Coding
- Long term confidentiality: a survey
- Mosaics of combinatorial designs for information-theoretic security
- Privacy amplification with asymptotically optimal entropy loss
- Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise
- Privacy amplification for quantum key distribution
- Title not available (Why is that?)
- Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode
- Key expanding in measurement-device-independent quantum key distribution
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration
- Efficient asynchronous verifiable secret sharing and multiparty computation
- Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system
- Unified view for notions of bit security
- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
- Cryptography from one-way communication: on completeness of finite channels
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Operational interpretation of the sandwiched Rényi divergence of order 1/2 to 1 as strong converse exponents
- Критерии секретности ключа
- Cryptography with One-Way Communication
- Quantum key distribution based on the quantum eraser
- Mediated Semi‐Quantum Key Distribution Using Single Photons
- A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
- A Lightweight Key Agreement Protocol with Authentication Capability
This page was built for publication: Generalized privacy amplification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4880313)