-
4
-
-
33750400412
-
Cryptography in the bounded quantum-storage model
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner. Cryptography in the bounded quantum-storage model. In Proceedings of the 4.8th IEEE Symposium, on foundations of Computer Science - FOCS 2005, 2005.
-
(2005)
Proceedings of the 4.8th IEEE Symposium, on Foundations of Computer Science - FOCS 2005
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
5
-
-
33750391293
-
-
Research Series RS-05-20, BRICS, University of Aarhus
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner. Cryptography in the bounded quantum-storage model. Research Series RS-05-20, BRICS, University of Aarhus (www.brios.dk), 2005.
-
(2005)
Cryptography in the Bounded Quantum-storage Model
-
-
Damgård, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
7
-
-
84957697395
-
On the impossibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
I. B. Damgård, J. Kilian, and L. Salvail. On the (impossibility of basing oblivious transfer and bit commitment on weakened security assumptions. In Advances in Cryptology - EUROCRYPT 1999, pages 56-73, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT 1999
, pp. 56-73
-
-
Damgård, I.B.1
Kilian, J.2
Salvail, L.3
-
8
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage model
-
Y. Z. Ding, D. Harnik, A. Rosen, and R. Shaltiel. Constant-round oblivious transfer in the bounded storage model. In Theory of Cryptography - TCC 2004, pages 446-472, 2004.
-
(2004)
Theory of Cryptography - TCC 2004
, pp. 446-472
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
9
-
-
84948989963
-
Perfectly concealing quantum bit commitment from any quantum one-way permutation
-
P. Dumais, D. Mayers, and L. Salvail. Perfectly concealing quantum bit commitment from any quantum one-way permutation. In Advances in Cryptology - EUROCRYPT 2000, pages 300-315, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 300-315
-
-
Dumais, P.1
Mayers, D.2
Salvail, L.3
-
11
-
-
0001260566
-
Is quantum bit commitment really possible?
-
April
-
H.-K. Lo and H. F. Chau. Is quantum bit commitment really possible? Physical Review Letters, 78:3410-3413, April 1997.
-
(1997)
Physical Review Letters
, vol.78
, pp. 3410-3413
-
-
Lo, H.-K.1
Chau, H.F.2
-
12
-
-
0001287029
-
Generalized entropie uncertainty relations
-
March
-
H. Maassen and J. B. M. Uffink. Generalized entropie uncertainty relations. Physical Review Letters; 60(12): 1103-1106, March 1988.
-
(1988)
Physical Review Letters
, vol.60
, Issue.12
, pp. 1103-1106
-
-
Maassen, H.1
Uffink, J.B.M.2
-
13
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
April
-
D. Mayers. Unconditionally secure quantum bit commitment is impossible. Physical Review letters, 78:3414-3417, April 1997.
-
(1997)
Physical Review Letters
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
15
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
February
-
R. Renner and R. König. Universally composable privacy amplification against quantum adversaries. In Theory of Cryptography - TCC 2005, pages 407-425, February 2005.
-
(2005)
Theory of Cryptography - TCC 2005
, pp. 407-425
-
-
Renner, R.1
König, R.2
-
16
-
-
84957609540
-
Quantum bit commitment from a physical assumption
-
L. Salvail. Quantum bit commitment from a physical assumption. In Advances in Cryptology - CRYPTO 1998, pages 338-353, 1998.
-
(1998)
Advances in Cryptology - CRYPTO 1998
, pp. 338-353
-
-
Salvail, L.1
-
17
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
July
-
P. W. Shor and J. Preskill. Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters, 85:441-444, July 2000.
-
(2000)
Physical Review Letters
, vol.85
, pp. 441-444
-
-
Shor, P.W.1
Preskill, J.2
|