-
1
-
-
51349164960
-
State discrimination with post-measurement information
-
Sep
-
M. Ballester, S. Wehner, and A. Winter, "State discrimination with post-measurement information," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4183-4198, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4183-4198
-
-
Ballester, M.1
Wehner, S.2
Winter, A.3
-
3
-
-
24144445587
-
The universal composable security of quantum key distribution
-
M. Ben-Or, M. Horodecki, D. Leung, D. Mayers, and J. Oppenheim, "The universal composable security of quantum key distribution," in Proc. 2nd Theory Cryptography Conf. (Lecture Notes Comput. Sci.), 2005, vol. 3378, pp. 386-406.
-
(2005)
Proc. 2nd Theory Cryptography Conf. (Lecture Notes Comput. Sci.)
, vol.3378
, pp. 386-406
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.3
Mayers, D.4
Oppenheim, J.5
-
5
-
-
10644267252
-
-
arXiv:0912.5537
-
C. H. Bennett, I. Devetak, A. Harrow, P. Show, and A.Winter, Quantum reverse Shannon theorem, 2009, arXiv:0912.5537.
-
(2009)
Quantum Reverse Shannon Theorem
-
-
Bennett, C.H.1
Devetak, I.2
Harrow, A.3
Show, P.4
Winter, A.5
-
6
-
-
84857709594
-
Workshop on cryptography from storage imperfections
-
presented at , Pasadena, CA, Mar. 20-22
-
A. Bocquet, "Workshop on cryptography from storage imperfections," presented at the presented at the Inst. Quantum Inf. Caltech, Pasadena, CA, Mar. 20-22, 2010.
-
(2010)
The Presented at the Inst. Quantum Inf. Caltech
-
-
Bocquet, A.1
-
7
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
8
-
-
84969361843
-
Practical quantum oblivious transfer
-
C. H. Bennett, G. Brassard, C. Crépeau, and H. Skubiszewska, "Practical quantum oblivious transfer," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 1992, vol. 576, pp. 351-366.
-
(1992)
Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.)
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, H.4
-
9
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
10
-
-
84963650728
-
Universal classes of hash functions
-
New York, NY
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," in Proc. 9th Annu. ACM Symp. Theory Comput., New York, NY, 1977, pp. 106-112.
-
(1977)
Proc. 9th Annu. ACM Symp. Theory Comput.
, pp. 106-112
-
-
Carter, J.L.1
Wegman, M.N.2
-
11
-
-
84946290541
-
Quantum oblivious transfer
-
C. Crépeau, "Quantum oblivious transfer," J. Modern Opt., vol. 41, no. 12, pp. 2455-2466, 1994.
-
(1994)
J. Modern Opt.
, vol.41
, Issue.12
, pp. 2455-2466
-
-
Crépeau, C.1
-
12
-
-
33748760285
-
Computational collapse of quantum state with application to oblivious.transfer
-
C. Crépeau, P. Dumais, D. Mayers, and L. Salvail, "Computational collapse of quantum state with application to oblivious.transfer," in Proc. Theory Cryptography Conf. (Lecture Notes Comput. Sci.), 2004, vol. 2951, pp. 374-393.
-
(2004)
Proc. Theory Cryptography Conf. (Lecture Notes Comput. Sci.)
, vol.2951
, pp. 374-393
-
-
Crépeau, C.1
Dumais, P.2
Mayers, D.3
Salvail, L.4
-
13
-
-
77953162623
-
Implementing twoparty protocols in the noisy-storage model
-
M. Curty, H. Lo, C. Schaffner, and S. Wehner, "Implementing twoparty protocols in the noisy-storage model," Phys. Rev. A, vol. 81, pp. 052336-1-052336-26, 2010.
-
(2010)
Phys. Rev. A
, vol.81
, pp. 0523361-05233626
-
-
Curty, M.1
Lo, H.2
Schaffner, C.3
Wehner, S.4
-
14
-
-
70350347114
-
Improving the security of quantum protocols
-
I. Damgård, S. Fehr, C. Lunemann, L. Salvail, and C. Schaffner, "Improving the security of quantum protocols," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2009, vol. 5677, pp. 408-427.
-
(2009)
Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.)
, vol.5677
, pp. 408-427
-
-
Damgard, I.1
Fehr, S.2
Lunemann, C.3
Salvail, L.4
Schaffner, C.5
-
15
-
-
38049138207
-
A tight high-order entropic quantum uncertainty relation with. Applications
-
I. B. Damgård, S. Fehr, R. Renner, L. Salvail, and C. Schaffner, "A tight high-order entropic quantum uncertainty relation with. Applications," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2007, vol. 4622, pp. 360-378.
-
(2007)
Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.)
, vol.4622
, pp. 360-378
-
-
Damgard, I.B.1
Fehr, S.2
Renner, R.3
Salvail, L.4
Schaffner, C.5
-
16
-
-
33748633496
-
Cryptography in the bounded-quantum-storage model
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner, "Cryptography in the bounded-quantum-storage model," in Proc. 46th Annu. IEEE Symp. Found. Comput. Sci., 2005, pp. 449-458.
-
(2005)
Proc. 46th Annu. IEEE Symp. Found. Comput. Sci.
, pp. 449-458
-
-
Damgard, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
17
-
-
38049128687
-
Secure identification and QKD in the bounded-quantum-storage model
-
I. B. Damgård, S. Fehr, L. Salvail, and C. Schaffner, "Secure identification and QKD in the bounded-quantum-storage model," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2007, vol. 4622, pp. 342-359.
-
(2007)
Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.)
, vol.4622
, pp. 342-359
-
-
Damgard, I.B.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
18
-
-
84880895217
-
Oblivious transfer in the bounded storage model
-
Y. Z. Ding, "Oblivious transfer in the bounded storage model," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2001, vol. 2139, pp. 155-170.
-
(2001)
Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.)
, vol.2139
, pp. 155-170
-
-
Ding, Y.Z.1
-
19
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage model
-
Y. Z. Ding, D. Harnik, A. Rosen, and R. Shaltiel, "Constant-round oblivious transfer in the bounded storage model," in Proc. Theory Cryptography Conf. (Lecture Notes Comput. Sci.), 2004, vol. 2951, pp. 446-472.
-
(2004)
Proc. Theory Cryptography Conf. (Lecture Notes Comput. Sci.)
, vol.2951
, pp. 446-472
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
20
-
-
84857698631
-
Workshop on cryptography from storage imperfections
-
presented at , Pasadena, CA, Mar. 20-22
-
C. Ervens, "Workshop on cryptography from storage imperfections," presented at the presented at the Inst. Quantum Inf. Caltech, Pasadena, CA, Mar. 20-22, 2010.
-
(2010)
The Presented at the Inst. Quantum Inf. Caltech
-
-
Ervens, C.1
-
24
-
-
84857743157
-
-
Personal communication with Andreas Winter
-
M. Hayashi, Personal communication with Andreas Winter 2010.
-
(2010)
-
-
Hayashi, M.1
-
25
-
-
24944472289
-
On robust combiners for oblivious transfer and other primitives
-
D. Harnik, J. Kilian, M. Naor, O. Reingold, and A. Rosen, "On robust combiners for oblivious transfer and other primitives," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2005, vol. 3494, pp. 96-113.
-
(2005)
Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.)
, vol.3494
, pp. 96-113
-
-
Harnik, D.1
Kilian, J.2
Naor, M.3
Reingold, O.4
Rosen, A.5
-
26
-
-
24144475180
-
On tolerant cryptographic constructions
-
A. Herzberg, "On tolerant cryptographic constructions," in Proc. CT-RSA (Lecture Notes Comput. Sci.), 2005, vol. 3376, pp. 172-190.
-
(2005)
Proc. CT-RSA (Lecture Notes Comput. Sci.)
, vol.3376
, pp. 172-190
-
-
Herzberg, A.1
-
27
-
-
0024866111
-
Pseudo- random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions," in Proc. 21st ACM Symp. Theory Comput., 1989, pp. 12-24.
-
(1989)
Proc. 21st ACM Symp. Theory Comput.
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
29
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian, "Founding cryptography on oblivious transfer," in Proc. 20th ACM Symp. Theory Comput., 1988, pp. 20-31.
-
(1988)
Proc. 20th ACM Symp. Theory Comput.
, pp. 20-31
-
-
Kilian, J.1
-
30
-
-
0035981679
-
Additivity for unital qubit channels
-
C. King, "Additivity for unital qubit channels," J. Math. Phys., vol. 43, pp. 4641-4653, 2002.
-
(2002)
J. Math. Phys.
, vol.43
, pp. 4641-4653
-
-
King, C.1
-
31
-
-
0037271821
-
The capacity of the quantum depolarizing channel
-
Jan
-
C. King, "The capacity of the quantum depolarizing channel," IEEE Trans. Inf. Theory, vol. 49, no. 1, pp. 221-229, Jan. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.1
, pp. 221-229
-
-
King, C.1
-
32
-
-
79959564588
-
Sampling of min-entropy relative to quantum knowledge
-
Jul
-
R. König and R. Renner, "Sampling of min-entropy relative to quantum knowledge," IEEE Trans. Inf. Theory, vol. 57, no. 7, pp. 4760-4787, Jul. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.7
, pp. 4760-4787
-
-
König, R.1
Renner, R.2
-
33
-
-
34047263436
-
Small accessible quantum information does not imply security
-
R. König, R. Renner, A. Bariska, and U. Maurer, "Small accessible quantum information does not imply security," Phys. Rev. Lett., vol. 98, pp. 140502-1-140502-4, 2007.
-
(2007)
Phys. Rev. Lett.
, vol.98
, pp. 1405021-1405024
-
-
König, R.1
Renner, R.2
Bariska, A.3
Maurer, U.4
-
35
-
-
39849104298
-
The bounded-storage model in the presence of a quantum adversary
-
Feb
-
R. König and B. Terhal, "The bounded-storage model in the presence of a quantum adversary," IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 749-762, Feb. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
König, R.1
Terhal, B.2
-
37
-
-
0001236013
-
Insecurity of quantum secure computations
-
H.-K. Lo, "Insecurity of quantum secure computations," Phys. Rev. A, vol. 56, pp. 1154-1162, 1997.
-
(1997)
Phys. Rev. A
, vol.56
, pp. 1154-1162
-
-
Lo, H.-K.1
-
38
-
-
0001260566
-
Is quantum bit commitment really possible?
-
H.-K. Lo and H. F. Chau, "Is quantum bit commitment really possible?," Phys. Rev. Lett., vol. 78, pp. 3410-3413, 1997.
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 3410-3413
-
-
Lo, H.-K.1
Chau, H.F.2
-
39
-
-
0001731260
-
Why quantum bit commitment and ideal quantum coin tossing are impossible
-
H.-K. Lo and H. F. Chau, "Why quantum bit commitment and ideal quantum coin tossing are impossible," Phys. D: Nonlinear Phenomena, vol. 120, pp. 177-187, 1998.
-
(1998)
Phys. D: Nonlinear Phenomena
, vol.120
, pp. 177-187
-
-
Lo, H.-K.1
Chau, H.F.2
-
41
-
-
0001287029
-
Generalized entropic uncertainty relations
-
H. Maassen and J. Uffink, "Generalized entropic uncertainty relations," Phys. Rev. Lett., vol. 60, pp. 1103-1106, 1988.
-
(1988)
Phys. Rev. Lett.
, vol.60
, pp. 1103-1106
-
-
Maassen, H.1
Uffink, J.2
-
43
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
U. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, no. 1, pp. 53-66, 1992.
-
(1992)
J. Cryptol.
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
45
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
D. Mayers, "Unconditionally secure quantum bit commitment is impossible," Phys. Rev. Lett., vol. 78, pp. 3414-3417, 1997.
-
(1997)
Phys. Rev. Lett.
, vol.78
, pp. 3414-3417
-
-
Mayers, D.1
-
46
-
-
38049022468
-
Robuster combiners for oblivious transfer
-
R. Meier, B. Przydatek, and J. Wullschleger, "Robuster combiners for oblivious transfer," in Proc. 4th Theory Cryptography Conf., 2007, pp. 404-418.
-
(2007)
Proc. 4th Theory Cryptography Conf.
, pp. 404-418
-
-
Meier, R.1
Przydatek, B.2
Wullschleger, J.3
-
47
-
-
1542660671
-
Fair games against an allpowerful adversary
-
R. Ostrovsky, R. Venkatesan, and M. Yung, "Fair games against an allpowerful adversary," in DIMACS: Series in Discrete Mathematics and Theoretical. Computer Science. Providence, RI: Amer. Math. Soc., pp. 155-169, 1991.
-
(1991)
DIMACS: Series in Discrete Mathematics and Theoretical. Computer Science. Providence, RI: Amer. Math. Soc.
, pp. 155-169
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
48
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," J. Soc. Ind. Appl. Math., vol. 8, no. 2, pp. 300-304, 1960.
-
(1960)
J. Soc. Ind. Appl. Math.
, vol.8
, Issue.2
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
49
-
-
33846181385
-
-
Ph.D. dissertation, Dept. of Physics, ETH Zurich, Zurich, Switzerland
-
R. Renner, "Security of QuantumKey Distribution," Ph.D. dissertation, Dept. of Physics, ETH Zurich, Zurich, Switzerland, 2005.
-
(2005)
Security of QuantumKey Distribution
-
-
Renner, R.1
-
51
-
-
54249170631
-
-
Ph.D. dissertation, Dept. of Computer Science, McGill University, Montreal, QC, Canada
-
G. Savvides, "Interactive Hashing and Reductions Between Oblivious Transfer," Ph.D. dissertation, Dept. of Computer Science, McGill University, Montreal, QC, Canada, 2007.
-
(2007)
Interactive Hashing and Reductions Between Oblivious Transfer
-
-
Savvides, G.1
-
52
-
-
71549133576
-
-
Ph.D. dissertation, Dept. of Computer Science, University of Aarhus, Aarhus, Denmark
-
C. Schaffner, "Cryptography in the Bounded-Quantum-Storage Model," Ph.D. dissertation, Dept. of Computer Science, University of Aarhus, Aarhus, Denmark, 2007.
-
(2007)
Cryptography in the Bounded-Quantum-Storage Model
-
-
Schaffner, C.1
-
54
-
-
71549160846
-
Robust cryptography in the noisy-quantum-storage model
-
C. Schaffner, B. Terhal, and S. Wehner, "Robust cryptography in the noisy-quantum-storage model," Quantum Inf. Comput., vol. 9, pp. 0963-0996, 2009.
-
(2009)
Quantum Inf. Comput.
, vol.9
, pp. 0963-0996
-
-
Schaffner, C.1
Terhal, B.2
Wehner, S.3
-
55
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
R. Shaltiel, "Recent developments in explicit constructions of extractors," Bull. EATCS, vol. 77, pp. 67-95, 2002.
-
(2002)
Bull. EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
57
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
Mar
-
W. Uhlmann, "Probability inequalities for sums of bounded random variables," J. Amer. Statist. Assoc., vol. 58, no. 301, pp. 13-30, Mar. 1963.
-
(1963)
J. Amer. Statist. Assoc.
, vol.58
, Issue.301
, pp. 13-30
-
-
Uhlmann, W.1
-
58
-
-
35248849411
-
On constructing locally computable extractors and cryptosystems in the bounded storage model
-
S. Vadhan, "On constructing locally computable extractors and cryptosystems in the bounded storage model," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2003, pp. 61-77.
-
(2003)
Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.)
, pp. 61-77
-
-
Vadhan, S.1
-
59
-
-
63849122169
-
-
arXiv:0806.3483. Ph.D. dissertation, School of Sciences, University of Amsterdam, Amsterdam, The Netherlands
-
S. Wehner, "Cryptography in a quantum world," Ph.D. dissertation, School of Sciences, University of Amsterdam, Amsterdam, The Netherlands, 2008, arXiv:0806.3483.
-
(2008)
Cryptography in a Quantum World
-
-
Wehner, S.1
-
61
-
-
44949188319
-
Cryptography from noisy storage
-
S. Wehner, C. Schaffner, and B. M. Terhal, "Cryptography from noisy storage," Phys. Rev. Lett., vol. 100, no. 22, pp. 220502-1-220502-4, 2008.
-
(2008)
Phys. Rev. Lett.
, vol.100
, Issue.22
, pp. 2205021-2205024
-
-
Wehner, S.1
Schaffner, C.2
Terhal, B.M.3
-
62
-
-
46449115193
-
Higher entropic uncertainty relations for anti-commuting observables
-
S. Wehner and A. Winter, "Higher entropic uncertainty relations for anti-commuting observables," J. Math. Phys., vol. 49, pp. 062105-1-062105-11, 2008.
-
(2008)
J. Math. Phys.
, vol.49
, pp. 0621051-06210511
-
-
Wehner, S.1
Winter, A.2
-
64
-
-
0001998264
-
Conjugate coding
-
S.Wiesner, "Conjugate coding," Sigact News, vol. 15, no. 1, pp. 78-88, 1983.
-
(1983)
Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
-
66
-
-
4243104359
-
Security of quantum protocols against coherent measurements
-
A. C.-C. Yao, "Security of quantum protocols against coherent measurements," in Proc. 20th ACM Symp. Theory Comput., 1995, pp. 67-75.
-
(1995)
Proc. 20th ACM Symp. Theory Comput.
, pp. 67-75
-
-
Yao, A.C.-C.1
|