메뉴 건너뛰기




Volumn 54, Issue 2, 2008, Pages 749-762

The bounded-storage model in the presence of a quantum adversary

Author keywords

Bounded storage model; Cryptography; Extractors; Locking; Privacy amplification; Quantum information theory; Quantum key distribution; Quantum memory; Security proofs; Universal composability

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; INFORMATION THEORY;

EID: 39849104298     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2007.913245     Document Type: Article
Times cited : (56)

References (37)
  • 1
    • 0030086632 scopus 로고    scopus 로고
    • N. Nisan and D. Zuckerman, Randomness is linear in space, J. Comp. Syst. Sci., 52, pp. 43-52, 1996, a preliminary version was presented at STOC'93.
    • N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comp. Syst. Sci., vol. 52, pp. 43-52, 1996, a preliminary version was presented at STOC'93.
  • 2
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • Online, Available
    • R. Shaltiel, "Recent developments in explicit constructions of extractors," Bull. EATCS vol. 77, pp. 67-95, 2002 [Online]. Available" http://dblp.uni-trier.de
    • (2002) Bull. EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 3
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Amer. Inst. Elec. Eng., vol. 55, pp. 109-115, 1926.
    • (1926) J. Amer. Inst. Elec. Eng , vol.55 , pp. 109-115
    • Vernam, G.S.1
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti, "Security and composition of multi-party cryptographic protocols," J. Cryptol., vol. 13, no. 1, pp. 143-202, 2000.
    • (2000) J. Cryptol , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 6
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 8
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, no. 1, pp. 53-66, 1992.
    • (1992) J. Cryptol , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 9
    • 0036612020 scopus 로고    scopus 로고
    • Everlasting security in the bounded storage model
    • Jun
    • Y. Aumann, Y. Z. Ding, and M. O. Rabin, "Everlasting security in the bounded storage model," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1668-1680, Jun. 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , Issue.6 , pp. 1668-1680
    • Aumann, Y.1    Ding, Y.Z.2    Rabin, M.O.3
  • 10
    • 0036040061 scopus 로고    scopus 로고
    • Tight security proofs for the bounded-storage model
    • Proc. 34th Annu. ACM Symp. Theory of Computing
    • S. Dziembowski and U. Maurer, "Tight security proofs for the bounded-storage model," in Proc. 34th Annu. ACM Symp. Theory of Computing, 2002, pp. 341-350, ser. Lecture Notes in Computer Science.
    • (2002) ser. Lecture Notes in Computer Science , pp. 341-350
    • Dziembowski, S.1    Maurer, U.2
  • 11
    • 84937432504 scopus 로고    scopus 로고
    • Hyper-encryption against space-bounded adversaries from on-line strong extractors
    • Advances in Cryptology, CRYPTO 2003, Berlin, Germany: Springer-verlag
    • C. Lu, "Hyper-encryption against space-bounded adversaries from on-line strong extractors," in Advances in Cryptology - CRYPTO 2003, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-verlag, 2002, pp. 18-22.
    • (2002) ser. Lecture Notes in Computer Science , pp. 18-22
    • Lu, C.1
  • 12
    • 4344628859 scopus 로고    scopus 로고
    • On constructing locally computable extractors and cryptosystems in the bounded-storage model
    • S. P. Vadhan, "On constructing locally computable extractors and cryptosystems in the bounded-storage model," J. Cryptology, vol. 17, no. 1, pp. 43-77, 2004.
    • (2004) J. Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 13
    • 23744481389 scopus 로고    scopus 로고
    • Security of BB84 QKD Protocol
    • Online, Available:, slides Part II
    • M. Ben-Or, "Security of BB84 QKD Protocol," 2002 [Online]. Available: http://www.msri.org/publications/in/msri/2002/quantumintro, (slides) Part II.
    • (2002)
    • Ben-Or, M.1
  • 14
    • 23744435400 scopus 로고    scopus 로고
    • On the power of quantum memory
    • Jul, Online, Available
    • R. König, U. Maurer, and R. Renner, "On the power of quantum memory," IEEE Trans. Inf. Theory vol. 51, no. 7, pp. 2391-2401, Jul. 2005 [Online]. Available: http://arxiv.org/abs/quant-ph/0305154
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.7 , pp. 2391-2401
    • König, R.1    Maurer, U.2    Renner, R.3
  • 15
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • Proc. Second Theory of Cryptography Conf. TCC, Berlin, Germany: Springer-Verlag, Online, Available
    • R. Renner and R. König, "Universally composable privacy amplification against quantum adversaries," in Proc. Second Theory of Cryptography Conf. TCC, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2005, vol. 3378, pp. 407-425 [Online]. Available: http://arxiv.org/abs/quant-ph/0403133
    • (2005) ser. Lecture Notes in Computer Science , vol.3378 , pp. 407-425
    • Renner, R.1    König, R.2
  • 21
    • 0003617018 scopus 로고    scopus 로고
    • Information-Theoretically and Computationally Secure Key Agreement in Cryptography
    • Ph.D. dissertation, Swiss Federal Institute of Technology ETH Zurich, Zurich, Switzerland, ETH dissertation No. 13138
    • S. Wolf, "Information-Theoretically and Computationally Secure Key Agreement in Cryptography" Ph.D. dissertation, Swiss Federal Institute of Technology (ETH Zurich), Zurich, Switzerland, 1999, ETH dissertation No. 13138.
    • (1999)
    • Wolf, S.1
  • 23
    • 34047263436 scopus 로고    scopus 로고
    • Small accessible quantum information does not imply security
    • Online, Available
    • R. König, R. Renner, A. Bariska, and U. Maurer, "Small accessible quantum information does not imply security," Phys. Rev. Lett. vol. 98, no. 14, p. 140502, 2007 [Online]. Available: http://link.aps.org/abstract/PRL/v98/e140502
    • (2007) Phys. Rev. Lett , vol.98 , Issue.14 , pp. 140502
    • König, R.1    Renner, R.2    Bariska, A.3    Maurer, U.4
  • 24
    • 39849096824 scopus 로고    scopus 로고
    • Master's thesis, Karlsruhe, Germany, Dec, Online, Available
    • D. Unruh, "Formal Security in Quantum Cryptology" Master's thesis, Karlsruhe, Germany, Dec. 2002 [Online]. Available: http://www.unrhu.de/DniQ/Publications
    • (2002) Formal Security in Quantum Cryptology
    • Unruh, D.1
  • 27
    • 24144445587 scopus 로고    scopus 로고
    • The universal composable security of quantum key distribution
    • Proc. Second Theory of Cryptography Conf. TCC, Berlin, Germany: Springer-Verlag, Online, Available
    • M. Ben-Or, M. Horodecki, D. W. Leung, D. Mayers, and J. Oppenheim, "The universal composable security of quantum key distribution," in Proc. Second Theory of Cryptography Conf. TCC, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2005, vol. 3378, pp. 386-406 [Online]. Available: http://arxiv.org/abs/quant-ph/0409078
    • (2005) ser. Lecture Notes in Computer Science , vol.3378 , pp. 386-406
    • Ben-Or, M.1    Horodecki, M.2    Leung, D.W.3    Mayers, D.4    Oppenheim, J.5
  • 28
    • 0035981791 scopus 로고    scopus 로고
    • Reversing quantum dynamics with near-optimal quantum and classical fidelity
    • H. Barnum and E. Knill, "Reversing quantum dynamics with near-optimal quantum and classical fidelity," J. Math. Phys., vol. 43, no. 5, pp. 2097-2106, 2002.
    • (2002) J. Math. Phys , vol.43 , Issue.5 , pp. 2097-2106
    • Barnum, H.1    Knill, E.2
  • 29
    • 0000229839 scopus 로고
    • A 'pretty good' measurement for distinguishing quantum states
    • P. Hausladen and W. Wootters, "A 'pretty good' measurement for distinguishing quantum states," J. Mod. Opt., vol. 41, no. 12, pp. 2385-2390, 1994.
    • (1994) J. Mod. Opt , vol.41 , Issue.12 , pp. 2385-2390
    • Hausladen, P.1    Wootters, W.2
  • 31
    • 0041175120 scopus 로고
    • Computing with very weak random sources
    • Santa Fe, NM, Nov, Online, Available
    • A. Srinivasan and D. Zuckerman, "Computing with very weak random sources," in Proc. IEEE Symp. Foundations of Computer Science, Santa Fe, NM, Nov. 1994, pp. 264-275 [Online]. Available: citeseer.ist.psu. edu/447609.html
    • (1994) Proc. IEEE Symp. Foundations of Computer Science , pp. 264-275
    • Srinivasan, A.1    Zuckerman, D.2
  • 32
    • 0034503771 scopus 로고    scopus 로고
    • Extracting randomness via repeated condensing
    • Redondo Beach, CA, Nov, Online, Available
    • O. Reingold, R. Shaltiel, and A. Wigderson, "Extracting randomness via repeated condensing," in Proc. IEEE Symp Foundations of Computer Science, Redondo Beach, CA, Nov. 2000, pp. 22-31 [Online]. Available: citeseer.ist.psu.edu/reingoldOOextracting.html
    • (2000) Proc. IEEE Symp Foundations of Computer Science , pp. 22-31
    • Reingold, O.1    Shaltiel, R.2    Wigderson, A.3
  • 33
    • 0032606505 scopus 로고    scopus 로고
    • Optimal lower bounds for quantum automata and random access codes
    • New York City, Oct, quant-ph/9904093
    • A. Nayak, "Optimal lower bounds for quantum automata and random access codes," in Proc. 40th Annu. Symp. Foundations of Computer Science New York City, Oct. 1999, pp. 369-377, quant-ph/9904093.
    • (1999) Proc. 40th Annu. Symp. Foundations of Computer Science , pp. 369-377
    • Nayak, A.1
  • 35
    • 29744466493 scopus 로고    scopus 로고
    • A de Finetti representation for finite symmetric quantum states
    • R. König and R. Renner, "A de Finetti representation for finite symmetric quantum states," J. Math. Phys., vol. 46, p. 122108, 2005.
    • (2005) J. Math. Phys , vol.46 , pp. 122108
    • König, R.1    Renner, R.2
  • 36
    • 39849083720 scopus 로고    scopus 로고
    • personal communication
    • P. Sen and A. Nayak, 2007, personal communication.
    • (2007)
    • Sen, P.1    Nayak, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.