메뉴 건너뛰기




Volumn 41, Issue 4, 2012, Pages 915-940

Trevisan's extractor in the presence of quantum side information

Author keywords

Quantum cryptography; Quantum information; Randomness extractors; Smooth min entropy

Indexed keywords

CLASSICAL INFORMATION; CLASSICAL PROBABILITIES; EXTRACTOR CONSTRUCTION; MIN-ENTROPY; POLYLOGARITHMIC; QUANTUM DEVICE; QUANTUM INFORMATION; QUANTUM SYSTEM; RANDOMNESS EXTRACTORS; SIDE INFORMATION;

EID: 84866427032     PISSN: 00975397     EISSN: None     Source Type: Journal    
DOI: 10.1137/100813683     Document Type: Conference Paper
Times cited : (116)

References (38)
  • 2
    • 84855970021 scopus 로고    scopus 로고
    • Better short-seed quantum-proof extractors
    • A. BEN-AROYA and A. TA-SHMA, Better short-seed quantum-proof extractors, Theoret. Comput. Sci., 419(2012), pp. 17-25.
    • (2012) Theoret. Comput. Sci. , vol.419 , pp. 17-25
    • Ben-Aroya, A.1    Ta-Shma, A.2
  • 4
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. BENNETT, G. BRASSARD, and J.-M. ROBERT, Privacy amplification by public discussion, SIAM J. Comput., 17(1988), pp. 210-229.
    • (1988) SIAM J. Comput. , vol.17 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 6
    • 35448991662 scopus 로고    scopus 로고
    • Exponential separations for one-way quantum communication complexity, with applications to cryptography
    • DOI 10.1145/1250790.1250866, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
    • D. GAVINSKY, J. KEMPE, I. KERENIDIS, R. RAZ, and R. DE WOLF, Exponential separations for one-way quantum communication complexity, with applications to cryptography, in Proceedings of the 39th Symposium on Theory of Computing (STOC'07), ACM, New York, 2007, pp. 516-525. (Pubitemid 47630771)
    • (2007) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 516-525
    • Gavinsky, D.1    Kempe, J.2    Kerenidis, I.3    Raz, R.4    De Wolf, R.5
  • 8
    • 0141515461 scopus 로고    scopus 로고
    • On the distribution of the number of roots of polynomials and explicit weak designs
    • T. HARTMAN and R. RAZ, On the distribution of the number of roots of polynomials and explicit weak designs, Random Structures Algorithms, 23(2003), pp. 235-263.
    • (2003) Random Structures Algorithms , vol.23 , pp. 235-263
    • Hartman, T.1    Raz, R.2
  • 12
    • 79959564588 scopus 로고    scopus 로고
    • Sampling of min-entropy relative to quantum knowledge
    • R. KÖNIG and R. RENNER, Sampling of min-entropy relative to quantum knowledge, IEEE Trans. Inform. Theory, 57(2011), pp. 4760-4787.
    • (2011) IEEE Trans. Inform. Theory , vol.57 , pp. 4760-4787
    • König, R.1    Renner, R.2
  • 14
    • 39849104298 scopus 로고    scopus 로고
    • The bounded-storage model in the presence of a quantum adversary
    • DOI 10.1109/TIT.2007.913245
    • R. KÖNIG and B. M. TERHAL, The bounded-storage model in the presence of a quantum adversary, IEEE Trans. Inform. Theory, 54(2008), pp. 749-762. (Pubitemid 351314663)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.2 , pp. 749-762
    • Konig, R.T.1    Terhal, B.M.2
  • 15
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • C.-J. LU, Encryption against storage-bounded adversaries from on-line strong extractors, J. Cryptol., 17(2004), pp. 27-42.
    • (2004) J. Cryptol. , vol.17 , pp. 27-42
    • Lu, C.-J.1
  • 16
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. M. MAURER, Conditionally-perfect secrecy and a provably-secure randomized cipher, Journal of Cryptology, 5(1992), pp. 53-66.
    • (1992) Journal of Cryptology , vol.5 , pp. 53-66
    • Maurer, U.M.1
  • 19
    • 0002956996 scopus 로고    scopus 로고
    • Bounds for dispersers, extractors, and depth-two superconcentrators
    • J. RADHAKRISHNAN and A. TA-SHMA, Bounds for dispersers, extractors, and depth-two superconcentrators, SIAM J. Discrete Math., 13(2000), pp. 2-24.
    • (2000) SIAM J. Discrete Math. , vol.13 , pp. 2-24
    • Radhakrishnan, J.1    Ta-Shma, A.2
  • 20
    • 34848882226 scopus 로고    scopus 로고
    • Extractors with weak random seeds
    • DOI 10.1145/1060590.1060593, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
    • R. RAZ, Extractors with weak random seeds, in Proceedings of the 37th Symposium on Theory of Computing (STOC'05), ACM, New York, 2005, pp. 11-20. (Pubitemid 43098567)
    • (2005) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 11-20
    • Raz, R.1
  • 21
    • 0038309373 scopus 로고    scopus 로고
    • Extracting all the randomness and reducing the error in Trevisan's extractors
    • DOI 10.1006/jcss.2002.1824
    • R. RAZ, O. REINGOLD, and S. VADHAN, Extracting all the randomness and reducing the error in Trevisan's extractors, J. Comput. System Sci., 65(2002), pp. 97-128. (Pubitemid 41161760)
    • (2003) Journal of Computer and System Sciences , vol.65 , Issue.1 , pp. 97-128
    • Raz, R.1    Reingold, O.2    Vadhan, S.3
  • 22
    • 33846181385 scopus 로고    scopus 로고
    • Ph. D. thesis, Department of Computer Science, Swiss Federal Institute of Technology Zurich, Zurich
    • R. RENNER, Security of Quantum Key Distribution, Ph. D. thesis, Department of Computer Science, Swiss Federal Institute of Technology Zurich, Zurich, 2005.
    • (2005) Security of Quantum Key Distribution
    • Renner, R.1
  • 23
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • R. SHALTIEL, Recent developments in explicit constructions of extractors, Bull. European Assoc. Theoret. Comput. Sci., 77(2002), pp. 67-95.
    • (2002) Bull. European Assoc. Theoret. Comput. Sci. , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 24
    • 27844593208 scopus 로고    scopus 로고
    • Simple extractors for all min-entropies and a new pseudorandom generator
    • DOI 10.1145/1059513.1059516
    • R. SHALTIEL and C. UMANS, Simple extractors for all min-entropies and a new pseudorandom generator, J. ACM, 52(2005), pp. 172-216. (Pubitemid 41655758)
    • (2005) Journal of the ACM , vol.52 , Issue.2 , pp. 172-216
    • Shaltiel, R.1    Umans, C.2
  • 26
    • 0032631071 scopus 로고    scopus 로고
    • Computing with very weak random sources
    • A. SRINIVASAN and D. ZUCKERMAN, Computing with very weak random sources, SIAM J. Comput., 28(1999), pp. 1433-1459.
    • (1999) SIAM J. Comput. , vol.28 , pp. 1433-1459
    • Srinivasan, A.1    Zuckerman, D.2
  • 27
    • 0002482317 scopus 로고    scopus 로고
    • List decoding: Algorithms and applications
    • M. SUDAN, List decoding: Algorithms and applications, SIGACT News, 31(2000), pp. 16-27.
    • (2000) SIGACT News , vol.31 , pp. 16-27
    • Sudan, M.1
  • 33
    • 0005314594 scopus 로고    scopus 로고
    • Extractors and pseudorandom generators
    • L. TREVISAN, Extractors and pseudorandom generators, J. ACM, 48(2001), pp. 860-879.
    • (2001) J. ACM , vol.48 , pp. 860-879
    • Trevisan, L.1
  • 34
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the boundedstorage model
    • S. P. VADHAN, Constructing locally computable extractors and cryptosystems in the boundedstorage model, J. Cryptol., 17(2004), pp. 43-77.
    • (2004) J. Cryptol. , vol.17 , pp. 43-77
    • Vadhan, S.P.1
  • 35
    • 0040707391 scopus 로고    scopus 로고
    • Expanders that beat the eigenvalue bound: Explicit construction and applications
    • A. WIGDERSON and D. ZUCKERMAN, Expanders that beat the eigenvalue bound: Explicit construction and applications, Combinatorica, 19(1999), pp. 125-138.
    • (1999) Combinatorica , vol.19 , pp. 125-138
    • Wigderson, A.1    Zuckerman, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.