Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
From MaRDI portal
Publication:5445521
DOI10.1007/978-3-540-78524-8_26zbMath1162.94355OpenAlexW1614939177MaRDI QIDQ5445521
Christian Schaffner, Serge Fehr
Publication date: 5 March 2008
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_26
Related Items (6)
Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2 ⋮ Exponential decay of matrix Φ-entropies on Markov semigroups with applications to dynamical evolutions of quantum ensembles ⋮ Secure identification and QKD in the bounded-quantum-storage model ⋮ Better short-seed quantum-proof extractors ⋮ Multi-partite squash operation and its application to device-independent quantum key distribution ⋮ Quantum Authentication and Encryption with Key Recycling
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Entropic security in quantum cryptography
- New hash functions and their use in authentication and set equality
- Small-Bias Probability Spaces: Efficient Constructions and Applications
- On the optimality of quantum encryption schemes
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Correcting errors without leaking partial information
- The Bounded-Storage Model in the Presence of a Quantum Adversary
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Simple Constructions of Almost k-wise Independent Random Variables
- A Pseudorandom Generator from any One-way Function
- Everlasting security in the bounded storage model
- Generalized privacy amplification
- More deterministic simulation in logspace
- Sampling of Min-Entropy Relative to Quantum Knowledge
- Quantum Entropic Security and Approximate Quantum Encryption
- Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
- Approximate Randomization of Quantum States With Fewer Bits of Key
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Theory of Cryptography
- Theory of Cryptography
- Oblivious Transfer and Linear Functions
This page was built for publication: Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker