Generalized privacy amplification
From MaRDI portal
Publication:4880313
Recommendations
Cited in
(only showing first 100 items - show all)- The smooth entropy formalism for von Neumann algebras
- Authenticated semi-quantum key distribution protocol using Bell states
- Amplifying Privacy in Privacy Amplification
- Cryptographic encryption scheme based on metastable excited nuclei
- Quantum computation: a tutorial
- An Improved Robust Fuzzy Extractor
- Lattice-based treshold-changeability for standard CRT secret-sharing schemes
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Quantum authentication with key recycling
- Secure communication in the twin paradox
- Deterministic six states protocol for quantum communication
- Better short-seed quantum-proof extractors
- Linking information reconciliation and privacy amplification
- Asynchronous Byzantine agreement with optimal resilience
- Securing QKD links in the full Hilbert space
- Privacy Amplification by Public Discussion
- Bell state entanglement swappings over collective noises and their applications on quantum cryptography
- A two-dimensional quantum key distribution protocol based on polarization-phase encoding
- Quantum Key Distribution
- A light-weight bit commitment protocol based on unpredictable channel noise
- Renyi entropy estimation revisited
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Relating different quantum generalizations of the conditional Rényi entropy
- Composable security of unidimensional continuous-variable quantum key distribution
- Self-similar solutions of Rényi's entropy and the concavity of its entropy power
- Secrecy capacity in the four-state protocol of quantum key distribution
- Quantum information with continuous variables
- Semiquantum key distribution without invoking the classical party's measurement capability
- Leakage-resilient key exchange and two-seed extractors
- The effect of side-information on smooth entropy.
- Quantum cryptography
- Two-party quantum key agreement protocols under collective noise channel
- Quantum cryptography over underground optical fibers
- Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- Error correcting codes, block designs, perfect secrecy and finite fields
- Quantum key evolution and its applications
- THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT
- Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
- Semi-quantum key distribution using qudit systems and security proof
- Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange
- A practical protocol for three-party authenticated quantum key distribution
- Statistical inference for the \(\epsilon \)-entropy and the quadratic Rényi entropy
- Semi-quantum key distribution robust against combined collective noise
- Trojan horse attack free fault-tolerant quantum key distribution protocols
- Role of information theoretic uncertainty relations in quantum theory
- Experimental quantum cryptography.
- Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- On the existence of statistically hiding bit commitment schemes and fail-stop signatures
- One-shot decoupling
- Theory of Cryptography
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Quantum key distribution using sequential weak values
- Vulnerability of ``a novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography
- Study on the security of the authentication scheme with key recycling in QKD
- A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication
- Quantum key distribution based on interferometry and interaction-free measurement
- Efficient quantum secret sharing
- Secure message transmission by public discussion: a brief survey
- Secure computation from leaky correlated randomness
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- Quantum key distribution using a two-way quantum channel
- Using quantum key distribution for cryptographic purposes: a survey
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise
- An improved QKD protocol without public announcement basis using periodically derived basis
- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
- Short leakage resilient and non-malleable secret sharing schemes
- A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage
- Cryptography from one-way communication: on completeness of finite channels
- Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system
- Mosaics of combinatorial designs for information-theoretic security
- Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement
- Seven definitions of bipartite bound entanglement
- Novel reconciliation protocol based on spinal code for continuous-variable quantum key distribution
- Novel encoding-decoding procedure for quantum key distribution
- Rate-adaptive reconciliation with polar coding for continuous-variable quantum key distribution
- Efficient information reconciliation in quantum key distribution systems using informed design of non-binary LDPC codes
- Limited resource semiquantum secret sharing
- scientific article; zbMATH DE number 2044521 (Why is no real title available?)
- Privacy amplification from non-malleable codes
- Cryptography with One-Way Communication
- Mediated Semi‐Quantum Key Distribution Using Single Photons
- Unified view for notions of bit security
- The security analysis of quantum B92 protocol in collective-rotation noise channel
- On the local leakage resilience of linear secret sharing schemes
- Efficient mediated semi-quantum key distribution
- Quantum security analysis via smoothing of Renyi entropy of order 2
- Distributions attaining secret key at a rate of the conditional mutual information
- Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker
- Basics of secrecy coding
- An eavesdropping game with SINR as an objective function
- Higher-rate quantum key expansion scheme
- High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction
- Multiparty blind quantum computation protocol with deterministic mutual identity authentication
- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification
- Long term confidentiality: a survey
This page was built for publication: Generalized privacy amplification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4880313)