메뉴 건너뛰기




Volumn 58, Issue 3, 2012, Pages 1962-1984

Unconditional security from noisy quantum storage

Author keywords

Cryptography; quantum computing

Indexed keywords

BIT COMMITMENT; CRYPTOGRAPHIC PRIMITIVES; NOISE LEVELS; OBLIVIOUS TRANSFER; QUANTUM COMPUTING; QUANTUM KEY DISTRIBUTION; UNCONDITIONAL SECURITY;

EID: 84857779174     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2011.2177772     Document Type: Article
Times cited : (157)

References (66)
  • 1
    • 51349164960 scopus 로고    scopus 로고
    • State discrimination with post-measurement information
    • Sep
    • M. Ballester, S. Wehner, and A. Winter, "State discrimination with post-measurement information," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4183-4198, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4183-4198
    • Ballester, M.1    Wehner, S.2    Winter, A.3
  • 6
    • 84857709594 scopus 로고    scopus 로고
    • Workshop on cryptography from storage imperfections
    • presented at , Pasadena, CA, Mar. 20-22
    • A. Bocquet, "Workshop on cryptography from storage imperfections," presented at the presented at the Inst. Quantum Inf. Caltech, Pasadena, CA, Mar. 20-22, 2010.
    • (2010) The Presented at the Inst. Quantum Inf. Caltech
    • Bocquet, A.1
  • 9
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 11
    • 84946290541 scopus 로고
    • Quantum oblivious transfer
    • C. Crépeau, "Quantum oblivious transfer," J. Modern Opt., vol. 41, no. 12, pp. 2455-2466, 1994.
    • (1994) J. Modern Opt. , vol.41 , Issue.12 , pp. 2455-2466
    • Crépeau, C.1
  • 13
    • 77953162623 scopus 로고    scopus 로고
    • Implementing twoparty protocols in the noisy-storage model
    • M. Curty, H. Lo, C. Schaffner, and S. Wehner, "Implementing twoparty protocols in the noisy-storage model," Phys. Rev. A, vol. 81, pp. 052336-1-052336-26, 2010.
    • (2010) Phys. Rev. A , vol.81 , pp. 0523361-05233626
    • Curty, M.1    Lo, H.2    Schaffner, C.3    Wehner, S.4
  • 18
    • 84880895217 scopus 로고    scopus 로고
    • Oblivious transfer in the bounded storage model
    • Y. Z. Ding, "Oblivious transfer in the bounded storage model," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2001, vol. 2139, pp. 155-170.
    • (2001) Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.) , vol.2139 , pp. 155-170
    • Ding, Y.Z.1
  • 20
    • 84857698631 scopus 로고    scopus 로고
    • Workshop on cryptography from storage imperfections
    • presented at , Pasadena, CA, Mar. 20-22
    • C. Ervens, "Workshop on cryptography from storage imperfections," presented at the presented at the Inst. Quantum Inf. Caltech, Pasadena, CA, Mar. 20-22, 2010.
    • (2010) The Presented at the Inst. Quantum Inf. Caltech
    • Ervens, C.1
  • 24
    • 84857743157 scopus 로고    scopus 로고
    • Personal communication with Andreas Winter
    • M. Hayashi, Personal communication with Andreas Winter 2010.
    • (2010)
    • Hayashi, M.1
  • 26
  • 29
    • 84898989941 scopus 로고
    • Founding cryptography on oblivious transfer
    • J. Kilian, "Founding cryptography on oblivious transfer," in Proc. 20th ACM Symp. Theory Comput., 1988, pp. 20-31.
    • (1988) Proc. 20th ACM Symp. Theory Comput. , pp. 20-31
    • Kilian, J.1
  • 30
    • 0035981679 scopus 로고    scopus 로고
    • Additivity for unital qubit channels
    • C. King, "Additivity for unital qubit channels," J. Math. Phys., vol. 43, pp. 4641-4653, 2002.
    • (2002) J. Math. Phys. , vol.43 , pp. 4641-4653
    • King, C.1
  • 31
    • 0037271821 scopus 로고    scopus 로고
    • The capacity of the quantum depolarizing channel
    • Jan
    • C. King, "The capacity of the quantum depolarizing channel," IEEE Trans. Inf. Theory, vol. 49, no. 1, pp. 221-229, Jan. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.1 , pp. 221-229
    • King, C.1
  • 32
    • 79959564588 scopus 로고    scopus 로고
    • Sampling of min-entropy relative to quantum knowledge
    • Jul
    • R. König and R. Renner, "Sampling of min-entropy relative to quantum knowledge," IEEE Trans. Inf. Theory, vol. 57, no. 7, pp. 4760-4787, Jul. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.7 , pp. 4760-4787
    • König, R.1    Renner, R.2
  • 33
    • 34047263436 scopus 로고    scopus 로고
    • Small accessible quantum information does not imply security
    • R. König, R. Renner, A. Bariska, and U. Maurer, "Small accessible quantum information does not imply security," Phys. Rev. Lett., vol. 98, pp. 140502-1-140502-4, 2007.
    • (2007) Phys. Rev. Lett. , vol.98 , pp. 1405021-1405024
    • König, R.1    Renner, R.2    Bariska, A.3    Maurer, U.4
  • 35
    • 39849104298 scopus 로고    scopus 로고
    • The bounded-storage model in the presence of a quantum adversary
    • Feb
    • R. König and B. Terhal, "The bounded-storage model in the presence of a quantum adversary," IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 749-762, Feb. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.2 , pp. 749-762
    • König, R.1    Terhal, B.2
  • 37
    • 0001236013 scopus 로고    scopus 로고
    • Insecurity of quantum secure computations
    • H.-K. Lo, "Insecurity of quantum secure computations," Phys. Rev. A, vol. 56, pp. 1154-1162, 1997.
    • (1997) Phys. Rev. A , vol.56 , pp. 1154-1162
    • Lo, H.-K.1
  • 38
    • 0001260566 scopus 로고    scopus 로고
    • Is quantum bit commitment really possible?
    • H.-K. Lo and H. F. Chau, "Is quantum bit commitment really possible?," Phys. Rev. Lett., vol. 78, pp. 3410-3413, 1997.
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 3410-3413
    • Lo, H.-K.1    Chau, H.F.2
  • 39
    • 0001731260 scopus 로고    scopus 로고
    • Why quantum bit commitment and ideal quantum coin tossing are impossible
    • H.-K. Lo and H. F. Chau, "Why quantum bit commitment and ideal quantum coin tossing are impossible," Phys. D: Nonlinear Phenomena, vol. 120, pp. 177-187, 1998.
    • (1998) Phys. D: Nonlinear Phenomena , vol.120 , pp. 177-187
    • Lo, H.-K.1    Chau, H.F.2
  • 41
    • 0001287029 scopus 로고
    • Generalized entropic uncertainty relations
    • H. Maassen and J. Uffink, "Generalized entropic uncertainty relations," Phys. Rev. Lett., vol. 60, pp. 1103-1106, 1988.
    • (1988) Phys. Rev. Lett. , vol.60 , pp. 1103-1106
    • Maassen, H.1    Uffink, J.2
  • 43
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, no. 1, pp. 53-66, 1992.
    • (1992) J. Cryptol. , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 45
    • 0001336918 scopus 로고    scopus 로고
    • Unconditionally secure quantum bit commitment is impossible
    • D. Mayers, "Unconditionally secure quantum bit commitment is impossible," Phys. Rev. Lett., vol. 78, pp. 3414-3417, 1997.
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 3414-3417
    • Mayers, D.1
  • 48
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," J. Soc. Ind. Appl. Math., vol. 8, no. 2, pp. 300-304, 1960.
    • (1960) J. Soc. Ind. Appl. Math. , vol.8 , Issue.2 , pp. 300-304
    • Reed, I.S.1    Solomon, G.2
  • 49
    • 33846181385 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. of Physics, ETH Zurich, Zurich, Switzerland
    • R. Renner, "Security of QuantumKey Distribution," Ph.D. dissertation, Dept. of Physics, ETH Zurich, Zurich, Switzerland, 2005.
    • (2005) Security of QuantumKey Distribution
    • Renner, R.1
  • 52
    • 71549133576 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. of Computer Science, University of Aarhus, Aarhus, Denmark
    • C. Schaffner, "Cryptography in the Bounded-Quantum-Storage Model," Ph.D. dissertation, Dept. of Computer Science, University of Aarhus, Aarhus, Denmark, 2007.
    • (2007) Cryptography in the Bounded-Quantum-Storage Model
    • Schaffner, C.1
  • 54
    • 71549160846 scopus 로고    scopus 로고
    • Robust cryptography in the noisy-quantum-storage model
    • C. Schaffner, B. Terhal, and S. Wehner, "Robust cryptography in the noisy-quantum-storage model," Quantum Inf. Comput., vol. 9, pp. 0963-0996, 2009.
    • (2009) Quantum Inf. Comput. , vol.9 , pp. 0963-0996
    • Schaffner, C.1    Terhal, B.2    Wehner, S.3
  • 55
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • R. Shaltiel, "Recent developments in explicit constructions of extractors," Bull. EATCS, vol. 77, pp. 67-95, 2002.
    • (2002) Bull. EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 57
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • Mar
    • W. Uhlmann, "Probability inequalities for sums of bounded random variables," J. Amer. Statist. Assoc., vol. 58, no. 301, pp. 13-30, Mar. 1963.
    • (1963) J. Amer. Statist. Assoc. , vol.58 , Issue.301 , pp. 13-30
    • Uhlmann, W.1
  • 58
    • 35248849411 scopus 로고    scopus 로고
    • On constructing locally computable extractors and cryptosystems in the bounded storage model
    • S. Vadhan, "On constructing locally computable extractors and cryptosystems in the bounded storage model," in Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.), 2003, pp. 61-77.
    • (2003) Proc. Adv. Cryptol. (Lecture Notes Comput. Sci.) , pp. 61-77
    • Vadhan, S.1
  • 59
    • 63849122169 scopus 로고    scopus 로고
    • arXiv:0806.3483. Ph.D. dissertation, School of Sciences, University of Amsterdam, Amsterdam, The Netherlands
    • S. Wehner, "Cryptography in a quantum world," Ph.D. dissertation, School of Sciences, University of Amsterdam, Amsterdam, The Netherlands, 2008, arXiv:0806.3483.
    • (2008) Cryptography in a Quantum World
    • Wehner, S.1
  • 61
    • 44949188319 scopus 로고    scopus 로고
    • Cryptography from noisy storage
    • S. Wehner, C. Schaffner, and B. M. Terhal, "Cryptography from noisy storage," Phys. Rev. Lett., vol. 100, no. 22, pp. 220502-1-220502-4, 2008.
    • (2008) Phys. Rev. Lett. , vol.100 , Issue.22 , pp. 2205021-2205024
    • Wehner, S.1    Schaffner, C.2    Terhal, B.M.3
  • 62
    • 46449115193 scopus 로고    scopus 로고
    • Higher entropic uncertainty relations for anti-commuting observables
    • S. Wehner and A. Winter, "Higher entropic uncertainty relations for anti-commuting observables," J. Math. Phys., vol. 49, pp. 062105-1-062105-11, 2008.
    • (2008) J. Math. Phys. , vol.49 , pp. 0621051-06210511
    • Wehner, S.1    Winter, A.2
  • 64
    • 0001998264 scopus 로고
    • Conjugate coding
    • S.Wiesner, "Conjugate coding," Sigact News, vol. 15, no. 1, pp. 78-88, 1983.
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 66
    • 4243104359 scopus 로고
    • Security of quantum protocols against coherent measurements
    • A. C.-C. Yao, "Security of quantum protocols against coherent measurements," in Proc. 20th ACM Symp. Theory Comput., 1995, pp. 67-75.
    • (1995) Proc. 20th ACM Symp. Theory Comput. , pp. 67-75
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.