메뉴 건너뛰기




Volumn 6302 LNCS, Issue , 2010, Pages 656-669

Two-source extractors secure against quantum adversaries

Author keywords

Extractors; Quantum Information

Indexed keywords


EID: 78149293231     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15369-3_49     Document Type: Conference Paper
Times cited : (10)

References (34)
  • 1
    • 0000486090 scopus 로고
    • On the Einstein-Podolsky-Rosen paradox
    • Bell, J.S.: On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964)
    • (1964) Physics , vol.1 , pp. 195-200
    • Bell, J.S.1
  • 3
    • 4244023347 scopus 로고
    • Communication via one- and two-particle operators on Einstein-Podolsky- Rosen states
    • Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69(20), 2881-2884 (1992)
    • (1992) Phys. Rev. Lett. , vol.69 , Issue.20 , pp. 2881-2884
    • Bennett, C.H.1    Wiesner, S.J.2
  • 4
    • 33746365070 scopus 로고    scopus 로고
    • More on the sum-product phenomenon in prime fields and its applications
    • Bourgain, J.: More on the sum-product phenomenon in prime fields and its applications. IJNT 1(1), 1-32 (2005)
    • (2005) IJNT , vol.1 , Issue.1 , pp. 1-32
    • Bourgain, J.1
  • 5
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230-261 (1988)
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 6
    • 84961364322 scopus 로고    scopus 로고
    • Quantum entanglement and the communication complexity of the inner product function
    • Williams, C.P. (ed.) QCQC 1998 Springer, Heidelberg
    • Cleve, R., van Dam, W., Nielsen, M., Tapp, A.: Quantum entanglement and the communication complexity of the inner product function. In: Williams, C.P. (ed.) QCQC 1998. LNCS, vol. 1509, pp. 61-74. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1509 , pp. 61-74
    • Cleve, R.1    Van Dam, W.2    Nielsen, M.3    Tapp, A.4
  • 8
    • 78149355828 scopus 로고    scopus 로고
    • Near-optimal extractors against quantum storage
    • to appear
    • De, A., Vidick, T.: Near-optimal extractors against quantum storage. In: Proc. of STOC (2010) (to appear)
    • Proc. of STOC (2010)
    • De, A.1    Vidick, T.2
  • 9
    • 20544433132 scopus 로고    scopus 로고
    • Improved randomness extraction from two independent sources
    • Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) RANDOM 2004 and APPROX 2004 Springer, Heidelberg
    • Dodis, Y., Elbaz, A., Oliveira, R., Raz, R.: Improved randomness extraction from two independent sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) RANDOM 2004 and APPROX 2004. LNCS, vol. 3122, pp. 334-344. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3122 , pp. 334-344
    • Dodis, Y.1    Elbaz, A.2    Oliveira, R.3    Raz, R.4
  • 10
    • 30744451262 scopus 로고    scopus 로고
    • On extracting private randomness over a public channel
    • Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003 Springer, Heidelberg
    • Dodis, Y., Oliveira, R.: On extracting private randomness over a public channel. In: Arora, S., Jansen, K., Rolim, J.D.P., Sahai, A. (eds.) RANDOM 2003 and APPROX 2003. LNCS, vol. 2764, pp. 252-263. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2764 , pp. 252-263
    • Dodis, Y.1    Oliveira, R.2
  • 11
    • 40249085721 scopus 로고    scopus 로고
    • Randomness extraction via delta-biased masking in the presence of a quantum attacker
    • Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
    • Fehr, S., Schaffner, C.: Randomness extraction via delta-biased masking in the presence of a quantum attacker. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 465-481. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 465-481
    • Fehr, S.1    Schaffner, C.2
  • 12
    • 57849152099 scopus 로고    scopus 로고
    • Exponential separation for one-way quantum communication complexity, with applications to cryptography
    • Gavinsky, D., Kempe, J., Kerenidis, I., Raz, R., deWolf, R.: Exponential separation for one-way quantum communication complexity, with applications to cryptography. SIAM J. Comput. 38(5), 1695-1708 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.5 , pp. 1695-1708
    • Gavinsky, D.1    Kempe, J.2    Kerenidis, I.3    Raz, R.4    DeWolf, R.5
  • 13
    • 67650118855 scopus 로고    scopus 로고
    • Bounded-error quantum state identification and exponential separations in communication complexity
    • Gavinsky, D., Kempe, J., Regev, O., de Wolf, R.: Bounded-error quantum state identification and exponential separations in communication complexity. SIAM J. Comput. 39(1), 1-24 (2009)
    • (2009) SIAM J. Comput. , vol.39 , Issue.1 , pp. 1-24
    • Gavinsky, D.1    Kempe, J.2    Regev, O.3    De Wolf, R.4
  • 14
    • 34247496907 scopus 로고    scopus 로고
    • Strengths and weaknesses of quantum fingerprinting
    • Gavinsky, D., Kempe, J., de Wolf, R.: Strengths and weaknesses of quantum fingerprinting. In: Proc. of CCC, pp. 288-298 (2006)
    • (2006) Proc. of CCC , pp. 288-298
    • Gavinsky, D.1    Kempe, J.2    De Wolf, R.3
  • 15
    • 30744456117 scopus 로고
    • Three xor-lemmas - An exposition
    • Goldreich, O.: Three xor-lemmas - an exposition. ECCC 2(56) (1995)
    • (1995) ECCC , vol.2 , Issue.56
    • Goldreich, O.1
  • 16
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions
    • extended abstracts.
    • Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions (extended abstracts). In: Proc. of STOC, pp. 12-24 (1989)
    • (1989) Proc. of STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.A.2    Luby, M.3
  • 17
    • 77952399265 scopus 로고    scopus 로고
    • 2-source extractors under computational assumptions and cryptography with defective randomness
    • Kalai, Y.T., Li, X., Rao, A.: 2-source extractors under computational assumptions and cryptography with defective randomness. In: Proc. of FOCS, pp. 617-626 (2009)
    • (2009) Proc. of FOCS , pp. 617-626
    • Kalai, Y.T.1    Li, X.2    Rao, A.3
  • 20
    • 39849104298 scopus 로고    scopus 로고
    • The bounded-storage model in the presence of a quantum adversary
    • König, R.T., Terhal, B.M.: The bounded-storage model in the presence of a quantum adversary. IEEE Trans. Inform. Theory 54(2), 749-762 (2008)
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.2 , pp. 749-762
    • König, R.T.1    Terhal, B.M.2
  • 21
    • 33745190462 scopus 로고    scopus 로고
    • Limits on the ability of quantum states to convey classical messages
    • Nayak, A., Salzman, J.: Limits on the ability of quantum states to convey classical messages. Journal of the ACM 53(1), 184-206 (2006)
    • (2006) Journal of the ACM , vol.53 , Issue.1 , pp. 184-206
    • Nayak, A.1    Salzman, J.2
  • 23
    • 34848882226 scopus 로고    scopus 로고
    • Extractors with weak random seeds
    • Raz, R.: Extractors with weak random seeds. In: Proc. of STOC, pp. 11-20 (2005)
    • (2005) Proc. of STOC , pp. 11-20
    • Raz, R.1
  • 25
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • Kilian, J. (ed.) TCC 2005 Springer, Heidelberg
    • Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407-425. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 407-425
    • Renner, R.1    König, R.2
  • 26
    • 0021546972 scopus 로고
    • Generating quasi-random sequences from slightly-random sources
    • extended abstract.
    • Santha, M., Vazirani, U.V.: Generating quasi-random sequences from slightly-random sources (extended abstract). In: Proc. of FOCS, pp. 434-440 (1984)
    • (1984) Proc. of FOCS , pp. 434-440
    • Santha, M.1    Vazirani, U.V.2
  • 27
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67-95 (2002)
    • (2002) Bulletin of the EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 28
    • 70350689920 scopus 로고    scopus 로고
    • Short seed extractors against quantum storage
    • Ta-Shma, A.: Short seed extractors against quantum storage. In: Proc. of STOC, pp. 401-408 (2009)
    • (2009) Proc. of STOC , pp. 401-408
    • Ta-Shma, A.1
  • 30
    • 0005314594 scopus 로고    scopus 로고
    • Extractors and pseudorandom generators
    • Trevisan, L.: Extractors and pseudorandom generators. Journal of the ACM 48(4), 860-879 (2001)
    • (2001) Journal of the ACM , vol.48 , Issue.4 , pp. 860-879
    • Trevisan, L.1
  • 31
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasirandom sequences form two communicating semi-random sources
    • Vazirani, U.V.: Strong communication complexity or generating quasirandom sequences form two communicating semi-random sources. Combinatorica 7(4), 375-392 (1987)
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 375-392
    • Vazirani, U.V.1
  • 32
    • 78149345969 scopus 로고    scopus 로고
    • Personal communication
    • de Wolf, R.: Personal communication (2010)
    • (2010)
    • De Wolf, R.1
  • 33
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions
    • extended abstract
    • Yao, A.C.C.: Theory and applications of trapdoor functions (extended abstract). In: Proc. of FOCS, pp. 80-91 (1982)
    • (1982) Proc. of FOCS , pp. 80-91
    • Yao, A.C.C.1
  • 34
    • 0025564929 scopus 로고
    • General weak random sources
    • Zuckerman, D.: General weak random sources. In: Proc. of FOCS, pp. 534-543 (1990)
    • (1990) Proc. of FOCS , pp. 534-543
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.