메뉴 건너뛰기




Volumn 51, Issue 7, 2005, Pages 2391-2401

On the power of quantum memory

Author keywords

Cryptography; Privacy amplification; Quantum information theory; Quantum key distribution; Quantum memory; Security proofs; Universal hashing

Indexed keywords

CRYPTOGRAPHY; INFORMATION THEORY; MATHEMATICAL MODELS; PROBABILITY DISTRIBUTIONS; QUANTUM THEORY; SECURITY OF DATA; THEOREM PROVING;

EID: 23744435400     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2005.850087     Document Type: Article
Times cited : (65)

References (25)
  • 2
    • 4344699394 scopus 로고    scopus 로고
    • "Optimal randomizer efficiency in the bounded-storage model"
    • S. Dziembowski and U. Maurer, "Optimal randomizer efficiency in the bounded-storage model," J. Cryptol., vol. 17, no. 1, pp. 5-26, 2004.
    • (2004) J. Cryptol. , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 3
    • 35248849411 scopus 로고    scopus 로고
    • "On constructing locally computable extractors and cryptosystems in the bounded storage model"
    • S. Vadhan, "On constructing locally computable extractors and cryptosystems in the bounded storage model," in Advances in Cryptology - CRYPTO 2003, 2003, pp. 61-77.
    • (2003) Advances in Cryptology - CRYPTO 2003 , pp. 61-77
    • Vadhan, S.1
  • 4
    • 0032631760 scopus 로고    scopus 로고
    • "Dense quantum coding and a lower bound for 1-way quantum automata"
    • Atlanta, GA, May, quant-ph/9804043
    • A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani, "Dense quantum coding and a lower bound for 1-way quantum automata," in Proc. 31th ACM Symp. Theory of Computing, Atlanta, GA, May 1999, quant-ph/ 9804043, pp. 376-383.
    • (1999) Proc. 31th ACM Symp. Theory of Computing , pp. 376-383
    • Ambainis, A.1    Nayak, A.2    Ta-Shma, A.3    Vazirani, U.4
  • 5
    • 0032606505 scopus 로고    scopus 로고
    • "Optimal lower bounds for quantum automata and random access codes"
    • New York, Oct. quant-ph/9904093
    • A. Nayak, "Optimal lower bounds for quantum automata and random access codes," in Proc. 40th Annu. Symp. Foundations of Computer Science, New York, Oct. 1999, quant-ph/9904093, pp. 369-377.
    • (1999) Proc. 40th Annu. Symp. Foundations of Computer Science , pp. 369-377
    • Nayak, A.1
  • 6
    • 0036949108 scopus 로고    scopus 로고
    • "Privacy and interaction in quantum communication complexity and a theorem about the relative entropy of quantum states"
    • Vancouver, BC, Canada, Nov.
    • R. Jain, J. Radhakrishnan, and P. Sen, "Privacy and interaction in quantum communication complexity and a theorem about the relative entropy of quantum states," in Proc. 43rd Annu. IEEE Symp. Foundations of Computer Science (FOCS '02), Vancouver, BC, Canada, Nov. 2002, pp. 429-438.
    • (2002) Proc. 43rd Annu. IEEE Symp. Foundations of Computer Science (FOCS '02) , pp. 429-438
    • Jain, R.1    Radhakrishnan, J.2    Sen, P.3
  • 7
    • 0023985539 scopus 로고
    • "Privacy amplification by public discussion"
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 9
    • 0030086632 scopus 로고    scopus 로고
    • "Randomness is linear in space"
    • N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comp. Syst. Sci., vol. 52, pp. 43-52, 1996.
    • (1996) J. Comp. Syst. Sci. , vol.52 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 10
    • 19844376567 scopus 로고    scopus 로고
    • A Generic Security proof for Quantum Key Distribution
    • Online. Available
    • M. Christandl, R. Renner, and A. Ekert. (2004) A Generic Security Proof for Quantum Key Distribution. Online. Available: http://arxiv.org/abs/ quant-ph/0402131
    • (2004)
    • Christandl, M.1    Renner, R.2    Ekert, A.3
  • 12
    • 3042730516 scopus 로고    scopus 로고
    • "Unconditional security in quantum cryptography"
    • D. Mayers, "Unconditional security in quantum cryptography," J. Assoc. Comput. Mach., vol. 48, no. 3, pp. 351-406, 2001.
    • (2001) J. Assoc. Comput. Mach. , vol.48 , Issue.3 , pp. 351-406
    • Mayers, D.1
  • 13
    • 23744481389 scopus 로고    scopus 로고
    • Online. Available
    • M. Ben-Or. (2002) Security of BB84 QKD Protocol. Online. Available: http://www.msri.org/publications/ln/msri/2002/quantumintro/ben-or/2/
    • (2002) Security of Bb84 Qkd Protocol
    • Ben-Or, M.1
  • 15
    • 0018456171 scopus 로고
    • "Universal classes of hash functions"
    • J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comp. Sys. Sci., vol. 18, pp. 143-154, 1979.
    • (1979) J. Comp. Sys. Sci. , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 16
    • 0019572642 scopus 로고
    • "New hash functions and their use in authentication and set equality"
    • M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comp. Syst. Sci., vol. 22, pp. 265-279, 1981.
    • (1981) J. Comp. Syst. Sci. , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 18
    • 0003900151 scopus 로고
    • "Distinguishability and accessible information in quantum theory"
    • Ph.D. dissertation, Univ. New Mexico, Albuquerque
    • C. A. Fuchs, "Distinguishability and accessible information in quantum theory," Ph.D. dissertation, Univ. New Mexico, Albuquerque, 1995.
    • (1995)
    • Fuchs, C.A.1
  • 19
    • 33646828627 scopus 로고
    • "Three XOR-Lemmas - An Exposition"
    • Electronic Colloquium on Computational Complexity, Tech. Rep. TR95-056, Available: Online at at
    • O. Goldreich, "Three XOR-Lemmas - An Exposition," Electronic Colloquium on Computational Complexity, Tech. Rep. TR95-056, 1995. Available: Online at at http://eccc.uni-trier.de/eccc/.
    • (1995)
    • Goldreich, O.1
  • 20
    • 17744384340 scopus 로고    scopus 로고
    • "Improved Constructions for Extracting Quasi-Random Bits from Sources of Weak Randomness"
    • Master's thesis, Weizmann Inst. Sci., Available: Online at
    • A. Elbaz, "Improved Constructions for Extracting Quasi-Random Bits from Sources of Weak Randomness," Master's thesis, Weizmann Inst. Sci., 2003. Available: Online at http://wwwl.cs.columbia.edu/~arielbaz/.
    • (2003)
    • Elbaz, A.1
  • 21
    • 0017973511 scopus 로고
    • "Broadcast channels with confidential messages"
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 22
    • 0027599802 scopus 로고
    • "Secret key agreement by public discussion from common information"
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 24
    • 0002128111 scopus 로고
    • "A fast algorithm for proving terminating hypergeometric series identities"
    • D. Zeilberger, "A fast algorithm for proving terminating hypergeometric series identities," Discr. Math., vol. 80, pp. 207-211, 1990.
    • (1990) Discr. Math. , vol.80 , pp. 207-211
    • Zeilberger, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.