메뉴 건너뛰기




Volumn 4622 LNCS, Issue , 2007, Pages 342-359

Secure identification and QKD in the bounded-quantum-storage model

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA; USER INTERFACES;

EID: 38049128687     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74143-5_19     Document Type: Conference Paper
Times cited : (61)

References (12)
  • 3
    • 38049138207 scopus 로고    scopus 로고
    • A tight high-order entropic quantum uncertainty relation with applications
    • Menezes, A, ed, CRYPTO, Springer, Heidelberg
    • Damgård, I.B., Fehr, S., Renner, R., Salvail, L., Schaffner, C.: A tight high-order entropic quantum uncertainty relation with applications. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 360-378. Springer, Heidelberg
    • (2007) LNCS , vol.4622 , pp. 360-378
    • Damgård, I.B.1    Fehr, S.2    Renner, R.3    Salvail, L.4    Schaffner, C.5
  • 6
    • 33749541274 scopus 로고    scopus 로고
    • Robust fuzzy extractors and authenticated key agreement from close secrets
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 8
    • 35048832981 scopus 로고    scopus 로고
    • On generating the initial key in the bounded-storage model
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Dziembowski, S., Maurer, U.M.: On generating the initial key in the bounded-storage model. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 126-137. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 126-137
    • Dziembowski, S.1    Maurer, U.M.2
  • 12
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.