Generalized privacy amplification

From MaRDI portal
Publication:4880313

DOI10.1109/18.476316zbMath0856.94018OpenAlexW2154300278WikidataQ56610500 ScholiaQ56610500MaRDI QIDQ4880313

Claude Crépeau, Ueli M. Maurer, Gilles Brassard, Charles H. Bennett

Publication date: 25 February 1997

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/727ed75b22520485daa02dddb53457d8bd06d603



Related Items

Mediated Semi‐Quantum Key Distribution Without Invoking Quantum Measurement, Mediated Semi‐Quantum Key Distribution Using Single Photons, Three Attacks on the Mediated Semi‐Quantum Key Distribution without Invoking Quantum Measurement, Semi-quantum key distribution using qudit systems and security proof, Seven definitions of bipartite bound entanglement, Short leakage resilient and non-malleable secret sharing schemes, A Lightweight Key Agreement Protocol with Authentication Capability, Operational interpretation of the sandwiched Rényi divergence of order 1/2 to 1 as strong converse exponents, Quantum key distribution based on interferometry and interaction-free measurement, Cryptographic encryption scheme based on metastable excited nuclei, Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration, Efficient quantum secret sharing, Self-similar solutions of Rényi's entropy and the concavity of its entropy power, Quantum Cryptography over Underground Optical Fibers, Role of information theoretic uncertainty relations in quantum theory, Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2, Cryptography with One-Way Communication, Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information, Secure Computation from Leaky Correlated Randomness, Error correcting codes, block designs, perfect secrecy and finite fields, Basics of Secrecy Coding, Study on the security of the authentication scheme with key recycling in QKD, Experimental quantum cryptography., Relating different quantum generalizations of the conditional Rényi entropy, Linking information reconciliation and privacy amplification, Composable security of unidimensional continuous-variable quantum key distribution, On the existence of statistically hiding bit commitment schemes and fail-stop signatures, Secrecy capacity in the four-state protocol of quantum key distribution, Channels of small log-ratio leakage and characterization of two-party differentially private computation, Authenticated semi-quantum key distribution protocol using Bell states, Privacy amplification from non-malleable codes, A Probabilistic Error-Correcting Scheme that Provides Partial Secrecy, Secure communication in the twin paradox, QKD iterative information reconciliation based on LDPC codes, Novel reconciliation protocol based on spinal code for continuous-variable quantum key distribution, Novel encoding-decoding procedure for quantum key distribution, Rate-adaptive reconciliation with polar coding for continuous-variable quantum key distribution, An improved QKD protocol without public announcement basis using periodically derived basis, Unnamed Item, Cryptography from one-way communication: on completeness of finite channels, Bell state entanglement swappings over collective noises and their applications on quantum cryptography, SECURITY OF QUANTUM KEY DISTRIBUTION, The effect of side-information on smooth entropy., Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels, Long term confidentiality: a survey, Quantum computation: a tutorial, An Improved Robust Fuzzy Extractor, A light-weight bit commitment protocol based on unpredictable channel noise, Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths, One-shot decoupling, Quantum key distribution using a two-way quantum channel, Using quantum key distribution for cryptographic purposes: a survey, Trojan horse attack free fault-tolerant quantum key distribution protocols, Key-leakage evaluation of authentication in quantum key distribution with finite resources, Quantum key distribution using sequential weak values, Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange, A practical protocol for three-party authenticated quantum key distribution, Deterministic six states protocol for quantum communication, Response to Scheuer-Yariv: ``A classical key-distribution system based on Johnson (like) noise-how secure?, Secure Message Transmission by Public Discussion: A Brief Survey, Semiquantum key distribution without invoking the classical party's measurement capability, Semi-quantum key distribution robust against combined collective noise, Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna, An Eavesdropping Game with SINR as an Objective Function, A hierarchical modulation coherent communication scheme for simultaneous four-state continuous-variable quantum key distribution and classical communication, Критерии секретности ключа, QUANTUM KEY EVOLUTION AND ITS APPLICATIONS, Key expanding in measurement-device-independent quantum key distribution, Cryptanalysis and improvement in multi-party quantum key distribution protocol with new Bell states encoding mode, Quantum Key Distribution, Two-party quantum key agreement protocols under collective noise channel, Limited resource semiquantum secret sharing, THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT, Asynchronous Byzantine agreement with optimal resilience, Privacy amplification with asymptotically optimal entropy loss, Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis, Quantum cryptography, Optimal Reductions Between Oblivious Transfers Using Interactive Hashing, Efficient asynchronous verifiable secret sharing and multiparty computation, The smooth entropy formalism for von Neumann algebras, On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles, Statistical inference for the \(\epsilon \)-entropy and the quadratic Rényi entropy, A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage, Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker, On the local leakage resilience of linear secret sharing schemes, Reusable fuzzy extractor from the decisional Diffie-Hellman assumption, Lattice-based treshold-changeability for standard CRT secret-sharing schemes, Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker, Quantum information with continuous variables, A two-dimensional quantum key distribution protocol based on polarization-phase encoding, Better short-seed quantum-proof extractors, VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY", Cryptanalysis and improvement of the semi-quantum key distribution robust against combined collective noise, Limited resource semi-quantum secret sharing based on multi-level systems, The security analysis of quantum B92 protocol in collective-rotation noise channel, Efficient mediated semi-quantum key distribution, Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification, Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system, Securing QKD links in the full Hilbert space, Leakage-resilient key exchange and two-seed extractors, Relations between the observational entropy and Rényi information measures, Quantum key distribution using universal hash functions over finite fields, Higher-rate quantum key expansion scheme, High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction, Multiparty blind quantum computation protocol with deterministic mutual identity authentication, Quantum Authentication with Key Recycling, Mosaics of combinatorial designs for information-theoretic security