메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 449-458

Cryptography in the bounded quantum-storage model

Author keywords

[No Author keywords available]

Indexed keywords

BIT COMMITMENT; BOUNDED SIZE; CRYPTOGRAPHIC PRIMITIVES; QUANTUM MEMORY;

EID: 33748633496     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SFCS.2005.30     Document Type: Conference Paper
Times cited : (110)

References (21)
  • 6
    • 33750391293 scopus 로고    scopus 로고
    • Cryptography in the bounded quantum-storage model
    • BRICS. Department of Computer Science, University of Aarhus
    • I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner. Cryptography in the bounded quantum-storage model. Research Series RS-05-20, BRICS. Department of Computer Science, University of Aarhus (www.brics.dk), 2005.
    • (2005) Research Series RS-05-20
    • Damgård, I.B.1    Fehr, S.2    Salvail, L.3    Schaffner, C.4
  • 8
    • 84957697395 scopus 로고    scopus 로고
    • On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    • I. B. Damgård, J. Kilian, and L. Salvail. On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Advances in Cryptology - EURO-CRYPT 1999, pages 56-73, 1999.
    • (1999) Advances in Cryptology - EURO-CRYPT 1999 , pp. 56-73
    • Damgård, I.B.1    Kilian, J.2    Salvail, L.3
  • 10
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology - EUROCRYPT 2004, pages 523-540, 2004.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 11
    • 84948989963 scopus 로고    scopus 로고
    • Perfectly concealing quantum bit commitment from any quantum one-way permutation
    • P. Dumais, D. Mayers, and L. Salvail. Perfectly concealing quantum bit commitment from any quantum one-way permutation. In Advances in Cryptology - EUROCRYPT 2000, pages 300-315, 2000.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 300-315
    • Dumais, P.1    Mayers, D.2    Salvail, L.3
  • 13
    • 0032667067 scopus 로고    scopus 로고
    • Cryptographic distinguishability measures for quantum-mechanical states
    • C. A. Fuchs and J. van de Graaf. Cryptographic distinguishability measures for quantum-mechanical states. IEEE Transactions on Information Theory, 45(4):1216-1227, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.4 , pp. 1216-1227
    • Fuchs, C.A.1    Van De Graaf, J.2
  • 14
    • 0001260566 scopus 로고    scopus 로고
    • Is quantum bit commitment really possible?
    • April
    • H.-K. Lo and H. F. Chau. Is quantum bit commitment really possible? Physical Review Letters, 78:3410-3413, April 1997.
    • (1997) Physical Review Letters , vol.78 , pp. 3410-3413
    • Lo, H.-K.1    Chau, H.F.2
  • 15
    • 0001287029 scopus 로고
    • Generalized entropic uncertainty relations
    • March
    • H. Maassen and J. B. M. Uffink. Generalized entropic uncertainty relations. Physical Review Letters, 60(12):1103-1106, March 1988.
    • (1988) Physical Review Letters , vol.60 , Issue.12 , pp. 1103-1106
    • Maassen, H.1    Uffink, J.B.M.2
  • 16
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • April
    • D. Mayers. Unconditionally secure quantum bit commitment is impossible. Physical Review Letters, 78:3414-3417, April 1997.
    • (1997) Physical Review Letters , vol.78 , pp. 3414-3417
    • Mayers, D.1
  • 18
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • February
    • R. Renner and R. König. Universally composable privacy amplification against quantum adversaries. In Theory of Cryptography - TCC 2005, pages 407-425, February 2005.
    • (2005) Theory of Cryptography - TCC 2005 , pp. 407-425
    • Renner, R.1    König, R.2
  • 19
    • 84957609540 scopus 로고    scopus 로고
    • Quantum bit commitment from a physical assumption
    • L. Salvail. Quantum bit commitment from a physical assumption. In Advances in Cryptology - CRYPTO 1998, pages 338-353, 1998.
    • (1998) Advances in Cryptology - CRYPTO 1998 , pp. 338-353
    • Salvail, L.1
  • 20
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • July
    • P. W. Shor and J. Preskill. Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters. 85:441-444, July 2000.
    • (2000) Physical Review Letters , vol.85 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.