메뉴 건너뛰기




Volumn 3378, Issue , 2005, Pages 407-425

Universally composable privacy amplification against quantum adversaries

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 24144485355     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30576-7_22     Document Type: Conference Paper
Times cited : (331)

References (31)
  • 7
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. H. Bennett. Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21):3121-3124, 1992.
    • (1992) Physical Review Letters , vol.68 , Issue.21 , pp. 3121-3124
    • Bennett, C.H.1
  • 17
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • Conference version appeared in Proc. of STOC'02
    • S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5-26, 2004. Conference version appeared in Proc. of STOC'02.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 18
    • 0037319628 scopus 로고    scopus 로고
    • Proof of security of quantum key distribution with two-way classical communications
    • D. Gottesman and H.-K. Lo. Proof of security of quantum key distribution with two-way classical communications. IEEE Transactions on Information Theory, 49(2):457-475, 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.2 , pp. 457-475
    • Gottesman, D.1    Lo, H.-K.2
  • 24
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, 39(3):733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 31
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.