메뉴 건너뛰기




Volumn , Issue , 2010, Pages 161-170

Near-optimal extractors against quantum storage

Author keywords

bounded quantum storage; extractors; random access codes

Indexed keywords

ACCESS CODES; CRYPTOGRAPHIC APPLICATIONS; DECODING ALGORITHM; OPTIMAL EXTRACTORS; POLYLOGARITHMIC NUMBERS; RANDOM ACCESS;

EID: 77954740848     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1806689.1806713     Document Type: Conference Paper
Times cited : (17)

References (29)
  • 2
    • 77954699207 scopus 로고    scopus 로고
    • Preliminary version in
    • Preliminary version in Proc. of STOC 1999.
    • Proc. of STOC 1999
  • 3
    • 57949116863 scopus 로고    scopus 로고
    • A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing and LDCs
    • Full version at arXiv:0705.3806
    • A. Ben-Aroya, O. Regev, and R. de Wolf. A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing and LDCs . In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science, pages 477-486, 2008. Full version at arXiv:0705.3806.
    • (2008) Proceedings of the 49th IEEE Symposium on Foundations of Computer Science , pp. 477-486
    • Ben-Aroya, A.1    Regev, O.2    De Wolf, R.3
  • 6
    • 70350589607 scopus 로고    scopus 로고
    • Extractors using hardness amplification
    • A. De and L. Trevisan. Extractors using hardness amplification. In Proc. of APPROX-RANDOM, pages 462-475, 2009.
    • (2009) Proc. of APPROX-RANDOM , pp. 462-475
    • De, A.1    Trevisan, L.2
  • 7
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5-26, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 8
    • 40249085721 scopus 로고    scopus 로고
    • Randomness extraction via delta -biased masking in the presence of a quantum attacker
    • R. Canetti, editor, TCC, Springer
    • S. Fehr and C. Schaffner. Randomness extraction via delta -biased masking in the presence of a quantum attacker. In R. Canetti, editor, TCC, volume 4948 of Lecture Notes in Computer Science, pages 465-481. Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4948 , pp. 465-481
    • Fehr, S.1    Schaffner, C.2
  • 9
    • 57849152099 scopus 로고    scopus 로고
    • Exponential separation for one-way quantum communication complexity, with applications to cryptography
    • D. Gavinsky, J. Kempe, I. Kerenidis, R. Raz, and R. de Wolf. Exponential separation for one-way quantum communication complexity, with applications to cryptography. SIAM Journal of Computing, 38(5):1695-1708, 2008.
    • (2008) SIAM Journal of Computing , vol.38 , Issue.5 , pp. 1695-1708
    • Gavinsky, D.1    Kempe, J.2    Kerenidis, I.3    Raz, R.4    De Wolf, R.5
  • 10
    • 77954722026 scopus 로고    scopus 로고
    • Preliminary version in
    • Preliminary version in Proc. of STOC 2007.
    • Proc. of STOC 2007
  • 12
    • 0141515461 scopus 로고    scopus 로고
    • On the distribution of the number of roots of polynomials and explicit weak designs
    • T. Hartman and R. Raz. On the distribution of the number of roots of polynomials and explicit weak designs. Random Structures and Algorithms, 23(3):235-263, 2003.
    • (2003) Random Structures and Algorithms , vol.23 , Issue.3 , pp. 235-263
    • Hartman, T.1    Raz, R.2
  • 13
    • 0002455537 scopus 로고
    • Information-theoretic aspects of quantum measurement
    • A. Holevo. Information-theoretic aspects of quantum measurement. Problems of Information Transmission, 9(2):31-42, 1973.
    • (1973) Problems of Information Transmission , vol.9 , Issue.2 , pp. 31-42
    • Holevo, A.1
  • 16
    • 39849104298 scopus 로고    scopus 로고
    • The bounded storage model in presence of a quantum adversary
    • R. König and B. Terhal. The bounded storage model in presence of a quantum adversary. IEEE Transactions on Information Theory, 54(2):749-762, 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.2 , pp. 749-762
    • König, R.1    Terhal, B.2
  • 17
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27-42, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 27-42
    • Lu, C.-J.1
  • 18
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. M. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.M.1
  • 19
    • 33745190462 scopus 로고    scopus 로고
    • Limits on the ability of quantum states to convey classical messages
    • A. Nayak and J. Salzman. Limits on the ability of quantum states to convey classical messages. Journal of the ACM, 53(1):184-206, 2006.
    • (2006) Journal of the ACM , vol.53 , Issue.1 , pp. 184-206
    • Nayak, A.1    Salzman, J.2
  • 21
    • 77954726331 scopus 로고    scopus 로고
    • Preliminary version in
    • Preliminary version in Proc. of FOCS'88.
    • Proc. of FOCS'88
  • 22
    • 0038309373 scopus 로고    scopus 로고
    • Extracting all the randomness and reducing the error in trevisan's extractors
    • R. Raz, O. Reingold, and S. P. Vadhan. Extracting all the randomness and reducing the error in trevisan's extractors. J. Comput. Syst. Sci., 65(1):97-128, 2002.
    • (2002) J. Comput. Syst. Sci. , vol.65 , Issue.1 , pp. 97-128
    • Raz, R.1    Reingold, O.2    Vadhan, S.P.3
  • 23
    • 77954699207 scopus 로고    scopus 로고
    • Preliminary version in
    • Preliminary version in Proc. of STOC 1999.
    • Proc. of STOC 1999
  • 25
    • 77954735405 scopus 로고    scopus 로고
    • Preliminary version in
    • Preliminary version in STOC and CCC 1999.
    • STOC and CCC 1999
  • 27
    • 0005314594 scopus 로고    scopus 로고
    • Extractors and pseudorandom generators
    • L. Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4):860-879, 2001.
    • (2001) Journal of the ACM , vol.48 , Issue.4 , pp. 860-879
    • Trevisan, L.1
  • 28
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43-77, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 29
    • 15244355932 scopus 로고    scopus 로고
    • The complexity of constructing pseudorandom generators from hard functions
    • DOI 10.1007/s00037-004-0187-1
    • E. Viola. The complexity of constructing pseudorandom generators from hard functions. Computational Complexity, 13(3-4):147-188, 2004. (Pubitemid 40389759)
    • (2005) Computational Complexity , vol.13 , Issue.3-4 , pp. 147-188
    • Viola, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.