Theory of Cryptography
From MaRDI portal
Publication:5711655
DOI10.1007/b106171zbMath1079.94570arXivquant-ph/0403133OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711655
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0403133
Related Items (38)
Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) ⋮ Uniform continuity bound for sandwiched Rényi conditional entropy ⋮ HalftimeHash: modern hashing without 64-bit multipliers or finite fields ⋮ The Locking-Decoding Frontier for Generic Dynamics ⋮ Two-way unclonable encryption with a vulnerable sender ⋮ Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line ⋮ Measure-resend authenticated semi-quantum key distribution with single photons ⋮ Bounds for smooth min- and max-entropy ⋮ Differential phase encoded measurement-device-independent quantum key distribution ⋮ Entanglement of the antisymmetric state ⋮ A new framework for quantum oblivious transfer ⋮ A quantum key distribution on qudits using quantum operators ⋮ Composable Security in the Bounded-Quantum-Storage Model ⋮ Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths ⋮ One-shot decoupling ⋮ Simple and Tight Device-Independent Security Proofs ⋮ Secure identification and QKD in the bounded-quantum-storage model ⋮ Decoupling with unitary approximate two-designs ⋮ Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths ⋮ Discrete-phase-randomized coherent state source and its application in quantum key distribution ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ Robustness and device independence of verifiable blind quantum computing ⋮ Everlasting multi-party computation ⋮ Security proof for round-robin differential phase shift QKD ⋮ Chain rules for quantum Rényi entropies ⋮ Quantum cryptography ⋮ The quantum reverse Shannon theorem based on one-shot information theory ⋮ Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker ⋮ Preface ⋮ Preface ⋮ Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications ⋮ New bounds on classical and quantum one-way communication complexity ⋮ Toward secure communication using intra-particle entanglement ⋮ Quantum key distribution using universal hash functions over finite fields ⋮ Quantum and semi-quantum sealed-bid auction: vulnerabilities and advantages ⋮ Quantum Authentication with Key Recycling ⋮ Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)
This page was built for publication: Theory of Cryptography