Theory of Cryptography

From MaRDI portal
Publication:5711655

DOI10.1007/b106171zbMath1079.94570arXivquant-ph/0403133OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711655

Renato Renner, Robert Koenig

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/quant-ph/0403133




Related Items (38)

Attacks on quantum key distribution protocols that employ non-ITS authenticationHow to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\)Uniform continuity bound for sandwiched Rényi conditional entropyHalftimeHash: modern hashing without 64-bit multipliers or finite fieldsThe Locking-Decoding Frontier for Generic DynamicsTwo-way unclonable encryption with a vulnerable senderTwo-way deterministic quantum key distribution against passive detector side channel attacks in the forward lineMeasure-resend authenticated semi-quantum key distribution with single photonsBounds for smooth min- and max-entropyDifferential phase encoded measurement-device-independent quantum key distributionEntanglement of the antisymmetric stateA new framework for quantum oblivious transferA quantum key distribution on qudits using quantum operatorsComposable Security in the Bounded-Quantum-Storage ModelConcise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengthsOne-shot decouplingSimple and Tight Device-Independent Security ProofsSecure identification and QKD in the bounded-quantum-storage modelDecoupling with unitary approximate two-designsSecurity analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengthsDiscrete-phase-randomized coherent state source and its application in quantum key distributionA practical protocol for three-party authenticated quantum key distributionRobustness and device independence of verifiable blind quantum computingEverlasting multi-party computationSecurity proof for round-robin differential phase shift QKDChain rules for quantum Rényi entropiesQuantum cryptographyThe quantum reverse Shannon theorem based on one-shot information theoryRandomness Extraction Via δ-Biased Masking in the Presence of a Quantum AttackerPrefacePrefaceAdaptive Versus Non-Adaptive Strategies in the Quantum Setting with ApplicationsNew bounds on classical and quantum one-way communication complexityToward secure communication using intra-particle entanglementQuantum key distribution using universal hash functions over finite fieldsQuantum and semi-quantum sealed-bid auction: vulnerabilities and advantagesQuantum Authentication with Key RecyclingQuantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)






This page was built for publication: Theory of Cryptography