메뉴 건너뛰기




Volumn 57, Issue 7, 2011, Pages 4760-4787

Sampling of min-entropy relative to quantum knowledge

Author keywords

Bounded storage model; min entropy; privacy amplification; quantum cryptography; quantum extractors; randomness extraction; sampling

Indexed keywords

BOUNDED-STORAGE MODEL; MIN-ENTROPY; PRIVACY AMPLIFICATION; QUANTUM EXTRACTORS; RANDOMNESS EXTRACTION;

EID: 79959564588     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2011.2146730     Document Type: Article
Times cited : (58)

References (37)
  • 1
    • 0032631760 scopus 로고    scopus 로고
    • Dense quantum coding and a lower bound for 1-way quantum automata
    • presented at the, arXiv:quant-ph/ 9804043
    • A. Ambainis, A. Nayak, A. Ta-Shma, and U.Vazirani, "Dense quantum coding and a lower bound for 1-way quantum automata," presented at the 31st ACM Symp. Theory of Computing, 1999, arXiv:quant-ph/ 9804043.
    • (1999) 31st ACM Symp. Theory of Computing
    • Ambainis, A.1    Nayak, A.2    Ta-Shma, A.3    Vazirani, U.4
  • 2
    • 20744451398 scopus 로고    scopus 로고
    • Near-independence of permutations and an almost sure polynomial bound on the diameter of the symmetric group
    • Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms
    • L. Babai and T. P. Hayes, "Near-independence of permutations and an almost sure polynomial bound on the diameter of the symmetric group," in Proc. 16th Annu. ACM-SIAM Symp. Discrete Algorithms, SODA'05, Philadelphia, PA, 2005, pp. 1057-1066, Society for Industrial and Applied Mathematics. (Pubitemid 40851473)
    • (2005) Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms , pp. 1057-1066
    • Babai, L.1    Hayes, T.P.2
  • 3
    • 57949116863 scopus 로고    scopus 로고
    • A hypercontractive inequality for matrix-valued functions with applications to quantum computing and ldcs
    • Oct.
    • A. Ben-Aroya, O. Regev, and R. de Wolf, "A hypercontractive inequality for matrix-valued functions with applications to quantum computing and ldcs," Found. Comput. Sci., pp. 477-486, Oct. 2008.
    • (2008) Found. Comput. Sci. , pp. 477-486
    • Ben-Aroya, A.1    Regev, O.2    De Wolf, R.3
  • 5
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 6
    • 66949151794 scopus 로고    scopus 로고
    • Min- and max-relative entropies and a new entanglement monotone
    • Jun.
    • N. Datta, "Min- and max-relative entropies and a new entanglement monotone," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2816-2826, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2816-2826
    • Datta, N.1
  • 8
    • 0001918661 scopus 로고
    • La prévision: Ses lois logiques ses sources subjectives
    • B. de Finetti, "La prévision: ses lois logiques, ses sources subjectives," Ann. Inst. H. Poincaré, vol. 7, pp. 1-68, 1937.
    • (1937) Ann. Inst. H. Poincaré , vol.7 , pp. 1-68
    • De Finetti, B.1
  • 9
    • 0001740680 scopus 로고
    • Finite exchangeable sequences
    • P. Diaconis and D. Freedman, "Finite exchangeable sequences," Ann. Probab., vol. 8, no. 4, pp. 745-764, 1980.
    • (1980) Ann. Probab. , vol.8 , Issue.4 , pp. 745-764
    • Diaconis, P.1    Freedman, D.2
  • 12
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • Jan., Conference version appeared in Proc. STOC'02
    • S. Dziembowski and U. Maurer, "Optimal randomizer efficiency in the bounded-storage model," J. Cryptol., vol. 17, no. 1, pp. 5-26, Jan. 2004, Conference version appeared in Proc. STOC'02.
    • (2004) J. Cryptol. , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 13
    • 40249085721 scopus 로고    scopus 로고
    • Randomness extraction via delta-biased masking in the presence of a quantum attacker
    • Berlin/Heidelberg, Germany: Springer
    • S. Fehr and C. Schaffner, "Randomness extraction via delta-biased masking in the presence of a quantum attacker," in Theory of Cryptograph (TCC), Lecture Notes in Computer Science. Berlin/Heidelberg, Germany: Springer, 2008, vol. 4948, pp. 465-481.
    • (2008) Theory of Cryptograph (TCC), Lecture Notes in Computer Science , vol.4948 , pp. 465-481
    • Fehr, S.1    Schaffner, C.2
  • 16
    • 0011767018 scopus 로고
    • Statistical problems in quantum physics
    • Springer, Lecture Notes in Mathematics
    • A. S. Holevo, "Statistical problems in quantum physics," in Proc. 2nd Japan-USSR Symp. Probability Theory, 1973, pp. 104-119, Springer, Lecture Notes in Mathematics.
    • (1973) Proc. 2nd Japan-USSR Symp. Probability Theory , pp. 104-119
    • Holevo, A.S.1
  • 18
    • 23744435400 scopus 로고    scopus 로고
    • On the power of quantum memory
    • DOI 10.1109/TIT.2005.850087
    • R. König, U. Maurer, and R. Renner, "On the power of quantum memory," IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2391-2401, Jul. 2005, arXiv:quant-ph/0305154. (Pubitemid 41136399)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.7 , pp. 2391-2401
    • Konig, R.1    Maurer, U.2    Renner, R.3
  • 19
    • 69449101829 scopus 로고    scopus 로고
    • The operational meaning of conditional min-entropy
    • Sep.
    • R. König, C. Schaffner, and R. Renner, "The operational meaning of conditional min-entropy," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4337-4347, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4337-4347
    • König, R.1    Schaffner, C.2    Renner, R.3
  • 20
    • 39849104298 scopus 로고    scopus 로고
    • The bounded-storage model in the presence of a quantum adversary
    • DOI 10.1109/TIT.2007.913245
    • R. König and B. M. Terhal, "The bounded storage model in the presence of a quantum adversary," IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 749-762, Feb. 2008. (Pubitemid 351314663)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.2 , pp. 749-762
    • Konig, R.T.1    Terhal, B.M.2
  • 22
    • 33947642202 scopus 로고    scopus 로고
    • Conditional density operators and the subjectivity of quantum operations
    • G. Adenier, C. A. Fuchs, and A. Yu. Khrennikov, Eds., arXiv:quant-ph/0611233
    • M. S. Leifer, "Conditional density operators and the subjectivity of quantum operations," in Proc. Foundations of Probability and Physics-4, AIP Conf., G. Adenier, C. A. Fuchs, and A. Yu. Khrennikov, Eds., 2007, vol. 889, pp. 172-186, arXiv:quant-ph/0611233.
    • (2007) Proc. Foundations of Probability and Physics-4 AIP Conf. , vol.889 , pp. 172-186
    • Leifer, M.S.1
  • 24
    • 26844485031 scopus 로고    scopus 로고
    • Hyper-encryption against space-bounded adversaries from on-line strong extractors
    • Springer, Lecture Notes in Computer Science
    • C. Lu, "Hyper-encryption against space-bounded adversaries from on-line strong extractors," in Proc. Advances in Cryptology-CRYPTO 2003, 2002, pp. 18-22, Springer, Lecture Notes in Computer Science.
    • (2002) Proc. Advances in Cryptology-CRYPTO 2003 , pp. 18-22
    • Lu, C.1
  • 25
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, no. 1, pp. 53-66, 1992.
    • (1992) J. Cryptol. , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 27
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • DOI 10.1006/jcss.1996.0004
    • N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comput. Syst. Sci., vol. 52, pp. 43-52, 1996, A preliminary version appeared at STOC'93. (Pubitemid 126340848)
    • (1996) Journal of Computer and System Sciences , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 29
    • 33846181385 scopus 로고    scopus 로고
    • Ph.D. dissertation ETH, Zurich, Switzerland, arXiv:quant-ph/0512258
    • R. Renner, "Security of QuantumKey Distribution," Ph.D. dissertation, ETH, Zurich, Switzerland, 2005, arXiv:quant-ph/0512258.
    • (2005) Security of QuantumKey Distribution
    • Renner, R.1
  • 30
    • 34548394977 scopus 로고    scopus 로고
    • Symmetry of large physical systems implies independence of subsystems
    • R. Renner, "Symmetry of large physical systems implies independence of subsystems," Nature Phys., vol. 3, pp. 645-649, 2007.
    • (2007) Nature Phys. , vol.3 , pp. 645-649
    • Renner, R.1
  • 31
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • R. Renner and R. König, "Universally composable privacy amplification against quantum adversaries," in Proc. 2nd Theory of Cryptography Conf. TCC, 2005, pp. 407-425, Volume 3378 of Lecture Notes in Computer Science, Springer, arXiv:quant-ph/0403133. (Pubitemid 41231175)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 407-425
    • Renner, R.1    Konig, R.2
  • 32
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • [Online]. Available:
    • R. Shaltiel, "Recent developments in explicit constructions of extractors," Bull. EATCS vol. 77, pp. 67-95, 2002 [Online]. Available: http://dblp.uni-trier.de
    • (2002) Bull. EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 36
    • 0033316798 scopus 로고    scopus 로고
    • Coding theorem and strong converse for quantum channels
    • DOI 10.1109/18.796385
    • A. Winter, "Coding theorem and strong converse for quantum channels," IEEE Trans. Inf. Theory, vol. 45, no. 7, pp. 2481-2485, Nov. 1999. (Pubitemid 30514205)
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.7 , pp. 2481-2485
    • Winter, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.