-
1
-
-
39849104723
-
-
Note that this is for unconditional, information theoretic, security. If one is happy to upper bound Eve's computational power then other cryptographic schemes can be used e.g., the R.S.A. scheme [20].
-
Note that this is for unconditional, information theoretic, security. If one is happy to upper bound Eve's computational power then other cryptographic schemes can be used e.g., the R.S.A. scheme [20].
-
-
-
-
2
-
-
2142643721
-
Multipartite bound information exists and can be activated
-
A. Acín, J. I. Cirac, and L. Masanes, "Multipartite bound information exists and can be activated," Phys. Rev. Lett., vol. 92, pp. 107903-, 2004.
-
(2004)
Phys. Rev. Lett
, vol.92
, pp. 107903
-
-
Acín, A.1
Cirac, J.I.2
Masanes, L.3
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Computing, vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
4
-
-
4243445702
-
Concentrating partial entanglement by local operations
-
C. H. Bennett, H. J. Bernstein, S. Popescu, and B. Schumacher, "Concentrating partial entanglement by local operations," Phys. Rev. A, vol. 54, pp. 4707-4711, 1996.
-
(1996)
Phys. Rev. A
, vol.54
, pp. 4707-4711
-
-
Bennett, C.H.1
Bernstein, H.J.2
Popescu, S.3
Schumacher, B.4
-
5
-
-
0036508956
-
Classical analog of entanglement
-
D. Collins and S. Popescu, "Classical analog of entanglement," Phys. Rev. A, vol. 65, pp. 032321-1-032321-11, 2002.
-
(2002)
Phys. Rev. A
, vol.65
-
-
Collins, D.1
Popescu, S.2
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
7
-
-
84974621399
-
Linking Classical and Quantum Key Agreement: Is There Bound Information?
-
Proc. CRYPTO 2000 , Berlin, Germany: Springer-Verlag
-
N. Gisin and S. Wolf, "Linking Classical and Quantum Key Agreement: Is There Bound Information?," in Proc. CRYPTO 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1880, p. 482.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 482
-
-
Gisin, N.1
Wolf, S.2
-
8
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys., vol. 74, pp. 145-195, 2002.
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
9
-
-
0141922749
-
Linking classical and quantum key agreement: Is there a classical analog to bound entanglement?
-
N. Gisin, R. Renner, and Wolf, "Linking classical and quantum key agreement: Is there a classical analog to bound entanglement?," Algorithmica, vol. 34, no. 4, pp. 389-412, 2002.
-
(2002)
Algorithmica
, vol.34
, Issue.4
, pp. 389-412
-
-
Gisin, N.1
Renner, R.2
Wolf3
-
11
-
-
38049157842
-
Strengthening Key Agreement using Hard-Core Sets
-
Ph.D. dissertation, Konstanz, Germany, of
-
T. Holenstein, "Strengthening Key Agreement using Hard-Core Sets," Ph.D. dissertation, Konstanz, Germany, 2006, Vol. 7 of ETH Series in Information Security and Cryptography.
-
(2006)
ETH Series in Information Security and Cryptography
, vol.7
-
-
Holenstein, T.1
-
12
-
-
0008001217
-
Mixed-state entanglement and distillation: Is there a 'bound' entanglement in nature?
-
M. Horodecki, P. Horodecki, and R. Horodecki, "Mixed-state entanglement and distillation: Is there a 'bound' entanglement in nature?," Phys. Rev. Lett., vol. 80, pp. 5239-5242, 1998.
-
(1998)
Phys. Rev. Lett
, vol.80
, pp. 5239-5242
-
-
Horodecki, M.1
Horodecki, P.2
Horodecki, R.3
-
13
-
-
0000304550
-
General teleportation channel, singlet fraction, and quasi-distillation
-
M. Horodecki, P. Horodecki, and R. Horodecki, "General teleportation channel, singlet fraction, and quasi-distillation," Phys. Rev. A. vol. 60, pp. 1888-1898, 1999.
-
(1999)
Phys. Rev. A
, vol.60
, pp. 1888-1898
-
-
Horodecki, M.1
Horodecki, P.2
Horodecki, R.3
-
15
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
16
-
-
84955584118
-
Toward characterizing when information-theoretic key agreement is possible
-
Advances in Cryptology-ASI-ACRYPT'96 , Berlin, Germany: Springer-Verlag
-
U. M. Maurer and S. Wolf, "Toward characterizing when information-theoretic key agreement is possible," in Advances in Cryptology-ASI-ACRYPT'96 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1996, vol. 1163, pp. 196-.
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 196
-
-
Maurer, U.M.1
Wolf, S.2
-
17
-
-
0033097504
-
Unconditional secure key agreement and the intrinsic information
-
U. M. Maurer and S. Wolf, "Unconditional secure key agreement and the intrinsic information," IEEE Trans. Inf. Theory, vol. 45, pp. 499-514, 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
18
-
-
39849099618
-
-
ABE is distillable.
-
ABE is distillable.
-
-
-
-
19
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
Advances in Cryptology EUROCRYPT 2 003: Proc. Int. Conf. Theory and Applications of Cryptographic Techniques Warsaw, Poland, Berlin, Germany: Springer-Verlag
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Advances in Cryptology EUROCRYPT 2 003: Proc. Int. Conf. Theory and Applications of Cryptographic Techniques (Warsaw, Poland) (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
-
-
Renner, R.1
Wolf, S.2
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
21
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
22
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
|