-
2
-
-
84974621399
-
-
Proceedings of CRYPTO 2000 (Springer-Verlag, Berlin)
-
N. Gisin and S. Wolf, in Proceedings of CRYPTO 2000, Lecture Notes in Computer Science Vol. 1880 (Springer-Verlag, Berlin, 2000), p. 482.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 482
-
-
Gisin, N.1
Wolf, S.2
-
5
-
-
0038288033
-
-
D. Bruss, J. I. Cirac, P. Horodecki, F. Hulpke, B. Kraus, M. Lewenstein, and A. Sanpera, J. Mod. Opt. 49, 1399 (2002).
-
(2002)
J. Mod. Opt.
, vol.49
, pp. 1399
-
-
Bruss, D.1
Cirac, J.I.2
Horodecki, P.3
Hulpke, F.4
Kraus, B.5
Lewenstein, M.6
Sanpera, A.7
-
7
-
-
85032428283
-
-
note
-
Recently, a quantum argument was used in I. Kerenidis and R. de Wolf, quant-ph/0208062, for improving the existing bounds on a classical communication complexity problem.
-
-
-
-
8
-
-
4243216277
-
-
C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. Wootters, Phys. Rev. A 54, 3824 (1996).
-
(1996)
Phys. Rev. A
, vol.54
, pp. 3824
-
-
Bennett, C.H.1
DiVincenzo, D.P.2
Smolin, J.A.3
Wootters, W.K.4
-
9
-
-
0035823470
-
-
note
-
AB.
-
-
-
-
10
-
-
35248888499
-
-
Advances in Cryptology, EUROCRYPT 2003 (Springer-Verlag, Berlin)
-
R. Renner and S. Wolf, in Advances in Cryptology, EUROCRYPT 2003, Lecture Notes in Computer Science Vol. 2656 (Springer-Verlag, Berlin, 2003), p. 562.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 562
-
-
Renner, R.1
Wolf, S.2
-
11
-
-
85032429825
-
-
note
-
More precisely, given P(A, B, E), if C denotes the communication sent over the public channel for the preparation of N events of (A, B), there exists a channel for Eve mapping N realizations of E into C, where N → ∞.
-
-
-
-
12
-
-
85032429784
-
-
note
-
The initial definition of bound information given in Ref. [2] consisted of a probability distribution P(A, B, E) such that 0 = S(A; B ∥ E) < I(A:B ↓ E), where I(A: B ↓ E) is defined in Eq. (2). However, the two definitions are equivalent [R. Renner and S. Wolf (private communication)].
-
-
-
-
14
-
-
85032426101
-
-
note
-
By a tripartite key we mean a common random bit possessed by each of the three honest parties, about which Eve has virtually no information.
-
-
-
-
15
-
-
85032428022
-
-
note
-
This is analogous to the scenario of entanglement transformations. There (i) three collaborating parties can transform a shared GHZ state, (|000〉 + |111〉)/ √2, into a singlet, (|00〉 + |11〉)/ √2, between any pair of parties, and (ii), if Alice shares singlets with Bob and Clare, she can locally prepare a GHZ state and teleport two of the three qubits to both of them. These two procedures have the following cryptographic analogs: (i) the sharing of a tripartite secret key allows the honest parties to obtain a bipartite key between any two of them. The third party should simply forget her information. And (ii), if a party - say Alice - shares one secret key with Bob and other with Clare, she can distribute any kind of secret correlations using one-time pad, e.g., a tripartite key.
-
-
-
-
18
-
-
85032428866
-
-
note
-
Actually, the honest parties should run this protocol for a sufficiently large N and then apply error correction and privacy amplification techniques for distilling the key with asymptotically finite rate.
-
-
-
-
20
-
-
85032425995
-
-
A. Acín and N. Gisin, quant-ph/0310054
-
A. Acín and N. Gisin, quant-ph/0310054.
-
-
-
-
21
-
-
85032431216
-
-
K. Horodecki, M. Horodecki, P. Horodecki, and J. Oppenheim, quant-ph/0309110
-
K. Horodecki, M. Horodecki, P. Horodecki, and J. Oppenheim, quant-ph/0309110.
-
-
-
|