-
1
-
-
77956992510
-
On the efficiency of classical and quantum oblivious transfer reductions
-
Berlin, Germany: Springer-Verlag
-
S. Winkler and J. Wullschleger, "On the efficiency of classical and quantum oblivious transfer reductions," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 6223. Berlin, Germany: Springer-Verlag, 2010, pp. 707-723.
-
(2010)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, vol.6223
, pp. 707-723
-
-
Winkler, S.1
Wullschleger, J.2
-
2
-
-
0020312165
-
Protocols for secure computations
-
Nov
-
A. C. Yao, "Protocols for secure computations," in Proc. 23rd Annu. IEEE Symp. FOCS, Nov. 1982, pp. 160-164.
-
(1982)
Proc. 23rd Annu. IEEE Symp. FOCS
, pp. 160-164
-
-
Yao, A.C.1
-
3
-
-
85032194875
-
How to solve any protocol problem - An efficiency improvement
-
New York, NY, USA: Springer-Verlag
-
O. Goldreich and R. Vainish, "How to solve any protocol problem - An efficiency improvement," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science). New York, NY, USA: Springer-Verlag, 1988, pp. 73-86.
-
(1988)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, pp. 73-86
-
-
Goldreich, O.1
Vainish, R.2
-
4
-
-
84898989941
-
Founding cryptography on oblivious transfer
-
J. Kilian, "Founding cryptography on oblivious transfer," in Proc. 20th Annu. ACM STOC, 1988, pp. 20-31.
-
(1988)
Proc. 20th Annu. ACM STOC
, pp. 20-31
-
-
Kilian, J.1
-
5
-
-
0003462641
-
-
Harvard Aiken Comput. Lab., Cambrige, MA, USA, Tech. Rep. TR-81
-
M. O. Rabin, "How to exchange secrets by oblivious transfer," Harvard Aiken Comput. Lab., Cambrige, MA, USA, Tech. Rep. TR-81, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.O.1
-
6
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, pp. 637-647, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
7
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
New York, NY, USA: Springer-Verlag
-
C. Crépeau, "Equivalence between two flavours of oblivious transfers," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science). New York, NY, USA: Springer-Verlag, 1988, pp. 350-354.
-
(1988)
Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science)
, pp. 350-354
-
-
Crépeau, C.1
-
9
-
-
84969350571
-
On the reversibility of oblivious transfer
-
New York, NY, USA: Springer-Verlag
-
C. Crépeau and M. Sántha, "On the reversibility of oblivious transfer," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 547. New York, NY, USA: Springer-Verlag, 1991, pp. 106-113.
-
(1991)
Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science)
, vol.547
, pp. 106-113
-
-
Crépeau, C.1
Sántha, M.2
-
10
-
-
0030283655
-
Oblivious transfers and intersecting codes
-
PII S0018944896075189
-
G. Brassard, C. Crépeau, and M. Santha, "Oblivious transfers and intersecting codes," IEEE Trans. Inf. Theory, vol. 42, no. 6, pp. 1769-1780, Nov. 1996. (Pubitemid 126769176)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, pp. 1769-1780
-
-
Brassard, G.1
Crepeau, C.2
Santha, M.3
-
11
-
-
84957611040
-
Lower bounds for oblivious transfer reductions
-
New York, NY, USA: Springer-Verlag
-
Y. Dodis and S. Micali, "Lower bounds for oblivious transfer reductions," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 1592. New York, NY, USA: Springer-Verlag, 1999, pp. 42-55.
-
(1999)
Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science)
, vol.1592
, pp. 42-55
-
-
Dodis, Y.1
Micali, S.2
-
12
-
-
33745181204
-
New monotones and lower bounds in unconditional two-party computation
-
New York, NY, USA: Springer-Verlag
-
S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 3621. New York, NY, USA: Springer-Verlag, 2005, pp. 467-477.
-
(2005)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, vol.3621
, pp. 467-477
-
-
Wolf, S.1
Wullschleger, J.2
-
13
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions (extended abstract)
-
Oct
-
C. Crépeau and J. Kilian, "Achieving oblivious transfer using weakened security assumptions (extended abstract)," in Proc. 29th Annu. IEEE Symp. FOCS, Oct. 1988, pp. 42-52.
-
(1988)
Proc. 29th Annu. IEEE Symp. FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
14
-
-
23944515855
-
Efficient unconditional oblivious transfer from almost any noisy channel
-
Security in Communication Networks - 4th International Conference, SCN 2004
-
C. Crépeau, K. Morozov, and S. Wolf, "Efficient unconditional oblivious transfer from almost any noisy channel," in Proc. 4th Conf. SCN, vol. 3352. 2004, pp. 47-59. (Pubitemid 41190996)
-
(2005)
Lecture Notes in Computer Science
, vol.3352
, pp. 47-59
-
-
Crepeau, C.1
Morozov, K.2
Wolf, S.3
-
15
-
-
26444482584
-
Unfair noisy channels and oblivious transfer
-
I. Damgård, S. Fehr, K. Morozov, and L. Salvail, "Unfair noisy channels and oblivious transfer," in Proc. TCC, vol. 2951. 2004, pp. 355-373.
-
(2004)
Proc. TCC
, vol.2951
, pp. 355-373
-
-
Damgård, I.1
Fehr, S.2
Morozov, K.3
Salvail, L.4
-
16
-
-
70350627590
-
Oblivious transfer from weak noisy channels
-
O. Reingold, Ed. Berlin, Germany: Springer-Verlag
-
J. Wullschleger, "Oblivious transfer from weak noisy channels," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 5444, O. Reingold, Ed. Berlin, Germany: Springer-Verlag, 2009, pp. 332-349.
-
(2009)
Theory of Cryptography (Lecture Notes in Computer Science)
, vol.5444
, pp. 332-349
-
-
Wullschleger, J.1
-
18
-
-
39049110635
-
On the oblivious transfer capacity of noisy correlations
-
DOI 10.1109/ISIT.2006.261805, 4036292, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
A. Nascimento and A. Winter, "On the oblivious transfer capacity of noisy correlations," in Proc. IEEE ISIT, Jul. 2006, pp. 1871-1875. (Pubitemid 351244423)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 1871-1875
-
-
Nascimento, A.C.A.1
Winter, A.2
-
19
-
-
84957712978
-
On the foundations of oblivious transfer
-
Advances in Cryptology - EUROCRYPT '98
-
C. Cachin, "On the foundations of oblivious transfer," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 1403. New York, NY, USA: Springer-Verlag, 1998, pp. 361-374. (Pubitemid 128081498)
-
(1998)
Lecture notes in computer science
, Issue.1403
, pp. 361-374
-
-
Cachin, C.1
-
20
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
New York, NY, USA: Springer-Verlag
-
I. Damgård, J. Kilian, and L. Salvail, "On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 1592. New York, NY, USA: Springer-Verlag, 1999, pp. 56-73.
-
(1999)
Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science)
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
21
-
-
21144437147
-
Oblivious transfers and privacy amplification
-
DOI 10.1007/s00145-002-0146-4
-
G. Brassard, C. Crépeau, and S. Wolf, "Oblivious transfers and privacy amplification," J. Cryptol., vol. 16, no. 4, pp. 219-237, 2003. (Pubitemid 40877274)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 219-237
-
-
Brassard, G.1
Crepeau, C.2
Wolf, S.3
-
22
-
-
33749565228
-
Oblivious transfer and linear functions
-
New York, NY, USA: Springer-Verlag
-
I. Damgård, S. Fehr, L. Salvail, and C. Schaffner, "Oblivious transfer and linear functions," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 4117. New York, NY, USA: Springer-Verlag, 2006.
-
(2006)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, vol.4117
-
-
Damgård, I.1
Fehr, S.2
Salvail, L.3
Schaffner, C.4
-
23
-
-
38049160265
-
Oblivious-transfer amplification
-
M. Naor, Ed. Berlin, Germany: Springer-Verlag
-
J. Wullschleger, "Oblivious-transfer amplification," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 4515, M. Naor, Ed. Berlin, Germany: Springer-Verlag, 2007, pp. 555-572.
-
(2007)
Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science)
, vol.4515
, pp. 555-572
-
-
Wullschleger, J.1
-
24
-
-
84969361843
-
Practical quantum oblivious transfer
-
New York, NY, USA: Springer-Verlag
-
C. H. Bennett, G. Brassard, C. Crépeau, and H. Skubiszewska, "Practical quantum oblivious transfer," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 576. New York, NY, USA: Springer-Verlag, 1992, pp. 351-366.
-
(1992)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, H.4
-
25
-
-
4243104359
-
Security of quantum protocols against coherent measurements
-
A. C.-C. Yao, "Security of quantum protocols against coherent measurements," in Proc. 27th Annu. ACM STOC, 1995, pp. 67-75.
-
(1995)
Proc. 27th Annu. ACM STOC
, pp. 67-75
-
-
Yao, A.C.-C.1
-
26
-
-
70350276849
-
Improving the security of quantum protocols
-
New York, NY, USA: Springer-Verlag
-
I. Damgård, S. Fehr, C. Lunemann, L. Salvail, and C. Schaffner, "Improving the security of quantum protocols," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science). New York, NY, USA: Springer-Verlag, 2009.
-
(2009)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
-
-
Damgård, I.1
Fehr, S.2
Lunemann, C.3
Salvail, L.4
Schaffner, C.5
-
27
-
-
77954644441
-
Universally composable quantum multi-party computation
-
H. Gilbert, Ed. Berlin, Germany: Springer-Verlag
-
D. Unruh, "Universally composable quantum multi-party computation," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 6110, H. Gilbert, Ed. Berlin, Germany: Springer-Verlag, 2010, pp. 486-505.
-
(2010)
Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science)
, vol.6110
, pp. 486-505
-
-
Unruh, D.1
-
28
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
D. Beaver, "Correlated pseudorandomness and the complexity of private computations," in Proc. 28th Annu. ACM STOC, 1996, pp. 479-488.
-
(1996)
Proc. 28th Annu. ACM STOC
, pp. 479-488
-
-
Beaver, D.1
-
29
-
-
84957050617
-
Information-theoretic cryptography
-
M. Wiener, Ed. Berlin, Germany: Springer-Verlag
-
U. Maurer, "Information-theoretic cryptography," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 1666, M. Wiener, Ed. Berlin, Germany: Springer-Verlag, 1999, p. 785.
-
(1999)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, vol.1666
, pp. 785
-
-
Maurer, U.1
-
30
-
-
45249110618
-
New monotones and lower bounds in unconditional two-party computation
-
Jun
-
S. Wolf and J. Wullschleger, "New monotones and lower bounds in unconditional two-party computation," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2792-2797, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2792-2797
-
-
Wolf, S.1
Wullschleger, J.2
-
32
-
-
80054795248
-
Assisted common information: Further results
-
Aug
-
V. Prabhakaran and M. Prabhakaran, "Assisted common information: Further results," in Proc. IEEE ISIT, Aug. 2011, pp. 2861-2865.
-
(2011)
Proc. IEEE ISIT
, pp. 2861-2865
-
-
Prabhakaran, V.1
Prabhakaran, M.2
-
33
-
-
45249091424
-
A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions
-
Jun
-
K. Kurosawa, W. Kishimoto, and T. Koshiba, "A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2566-2571, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2566-2571
-
-
Kurosawa, K.1
Kishimoto, W.2
Koshiba, T.3
-
34
-
-
35048856983
-
A quantitative approach to reductions in secure computation
-
M. Naor, Ed. Berlin, Germany: Springer-Verlag
-
A. Beimel and T. Malkin, "A quantitative approach to reductions in secure computation," in Theory of Cryptography (Lecture Notes in Computer Science), vol. 2951, M. Naor, Ed. Berlin, Germany: Springer-Verlag, 2004, pp. 238-257.
-
(2004)
Theory of Cryptography (Lecture Notes in Computer Science)
, vol.2951
, pp. 238-257
-
-
Beimel, A.1
Malkin, T.2
-
35
-
-
33746042169
-
Optimal reductions between oblivious transfers using Interactive Hashing
-
Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
C. Crépeau and G. Savvides, "Optimal reductions between oblivious transfers using interactive hashing," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 4004. New York, NY, USA: Springer-Verlag, 2006, pp. 201-221. (Pubitemid 44072241)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 201-221
-
-
Crepeau, C.1
Savvides, G.2
-
36
-
-
45249098450
-
On oblivious transfer capacity
-
R. Ahlswede and I. Csiszar, "On oblivious transfer capacity," in Proc. ISIT, 2007, pp. 2061-2064.
-
(2007)
Proc. ISIT
, pp. 2061-2064
-
-
Ahlswede, R.1
Csiszar, I.2
-
37
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
D. Mayers, "Unconditionally secure quantum bit commitment is impossible," Phys. Rev. Lett., vol. 78, no. 17, pp. 3414-3417, 1997. (Pubitemid 127657375)
-
(1997)
Physical Review Letters
, vol.78
, Issue.17
, pp. 3414-3417
-
-
Mayers, D.1
-
38
-
-
0001260566
-
Is quantum bit commitment really possible?
-
H. K. Lo and H. F. Chau, "Is quantum bit commitment really possible," Phys. Rev. Lett., vol. 78, no. 17, pp. 3410-3413, 1997. (Pubitemid 127657374)
-
(1997)
Physical Review Letters
, vol.78
, Issue.17
, pp. 3410-3413
-
-
Lo, H.-K.1
Chau, H.F.2
-
39
-
-
0001236013
-
Insecurity of quantum secure computations
-
H. K. Lo, "Insecurity of quantum secure computations," Phys. Rev. A, vol. 56, no. 2, p. 1154, 1997.
-
(1997)
Phys. Rev. A
, vol.56
, Issue.2
, pp. 1154
-
-
Lo, H.K.1
-
40
-
-
72449167006
-
On the power of two-party quantum cryptography
-
M. Matsui, Ed. New York, NY, USA: Springer-Veralg
-
L. Salvail, C. Schaffner, and M. Sotáková, "On the power of two-party quantum cryptography," in ASIACRYPT (Lecture Notes in Computer Science), vol. 5912, M. Matsui, Ed. New York, NY, USA: Springer-Veralg, 2009, pp. 70-87.
-
(2009)
ASIACRYPT (Lecture Notes in Computer Science)
, vol.5912
, pp. 70-87
-
-
Salvail, L.1
Schaffner, C.2
Sotáková, M.3
-
41
-
-
54249170631
-
-
Ph.D. dissertation, Dept. Comput. Sci., McGill Univ., Montreal, QC, Canada
-
G. Savvides, "Interactive hashing and reductions between oblivious transfer variants," Ph.D. dissertation, Dept. Comput. Sci., McGill Univ., Montreal, QC, Canada, 2007.
-
(2007)
Interactive Hashing and Reductions between Oblivious Transfer Variants
-
-
Savvides, G.1
-
42
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
C. Cachin and J. Camenisch, Eds. New York, NY, USA: Springer-Veralg
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in EUROCRYPT (Lecture Notes in Computer Science), vol. 3027, C. Cachin and J. Camenisch, Eds. New York, NY, USA: Springer-Veralg, 2004, pp. 523-540.
-
(2004)
EUROCRYPT (Lecture Notes in Computer Science)
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
43
-
-
33846181385
-
-
Ph.D. dissertation, Dept. Comput. Sci., ETH, Zürich, Switzerland
-
R. Renner, "Security of quantum key distribution," Ph.D. dissertation, Dept. Comput. Sci., ETH, Zürich, Switzerland, 2005.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
44
-
-
0030086632
-
Randomness is linear in space
-
DOI 10.1006/jcss.1996.0004
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comput. Syst. Sci., vol. 52, pp. 43-52, Feb. 1996. (Pubitemid 126340848)
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
45
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
DOI 10.1007/11593447-11, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification," in Advances in Cryptology - ASIACRYPT (Lecture Notes in Computer Science), vol. 3788. New York, NY, USA: Springer-Verlag, 2005, pp. 199-216. (Pubitemid 43763476)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
46
-
-
84928743703
-
Precomputing oblivious transfer
-
New York, NY, USA: Springer-Verlag
-
D. Beaver, "Precomputing oblivious transfer," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 963. New York, NY, USA: Springer-Verlag, 1995, pp. 97-109.
-
(1995)
Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science)
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
48
-
-
35048830930
-
Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
-
New York, NY, USA: Springer-Verlag
-
M. Fitzi, S. Wolf, and J. Wullschleger, "Pseudo-signatures, broadcast, and multi-party computation from correlated randomness," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 3152. New York, NY, USA: Springer-Verlag, 2004, pp. 562-578.
-
(2004)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, vol.3152
, pp. 562-578
-
-
Fitzi, M.1
Wolf, S.2
Wullschleger, J.3
-
49
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gacs and J. Körner, "Common information is far less than mutual information," Problems Control Inf. Theory, vol. 2, no. 2, pp. 149-162, 1973.
-
(1973)
Problems Control Inf. Theory
, vol.2
, Issue.2
, pp. 149-162
-
-
Gacs, P.1
Körner, J.2
-
50
-
-
33746074792
-
Oblivious transfer is symmetric
-
DOI 10.1007/11761679-14, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
S. Wolf and J. Wullschleger, "Oblivious transfer is symmetric," in Advances in Cryptology - EUROCRYPT (Lecture Notes in Computer Science), vol. 4004. New York, NY, USA: Springer-Verlag, 2006, pp. 222-232. (Pubitemid 44072242)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 222-232
-
-
Wolf, S.1
Wullschleger, J.2
-
51
-
-
84901293208
-
-
Ph.D. dissertation, Dept. Comput. Sci., ETH, Zürich, Switzerland
-
S. Winkler, "Classical and quantum secure two-party computation," Ph.D. dissertation, Dept. Comput. Sci., ETH, Zürich, Switzerland, 2012.
-
(2012)
Classical and Quantum Secure Two-party Computation
-
-
Winkler, S.1
-
52
-
-
72449167006
-
On the power of two-party quantum cryptography
-
Tokyo, Japan
-
L. Salvail, C. Schaffner, and M. Sotáková, "On the power of two-party quantum cryptography," in Proc. 15th Int. Conf. Theory Appl. Cryptol. Inf. Security, vol. 5912. Tokyo, Japan, 2009, pp. 70-87.
-
(2009)
Proc. 15th Int. Conf. Theory Appl. Cryptol. Inf. Security
, vol.5912
, pp. 70-87
-
-
Salvail, L.1
Schaffner, C.2
Sotáková, M.3
-
55
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
A. Winter, A. C. A. Nascimento, and H. Imai, "Commitment capacity of discrete memoryless channels," in Proc. IMA Int. Conf., 2003, pp. 35-51.
-
(2003)
Proc. IMA Int. Conf
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
56
-
-
1142301536
-
Continuity of quantum conditional information
-
DOI 10.1088/0305-4470/37/5/L01, PII S0305447004731716
-
R. Alicki and M. Fannes, "Continuity of quantum conditional information," J. Phys. A, Math. General, vol. 37, no. 5, pp. L55-L57, 2004. (Pubitemid 38214163)
-
(2004)
Journal of Physics A: Mathematical and General
, vol.37
, Issue.5
-
-
Alicki, R.1
Fannes, M.2
-
57
-
-
0000937315
-
Entropy inequalities
-
H. Araki and E. H. Lieb, "Entropy inequalities," Commun. Math. Phys., vol. 18, no. 2, pp. 160-170, 1970.
-
(1970)
Commun. Math. Phys
, vol.18
, Issue.2
, pp. 160-170
-
-
Araki, H.1
Lieb, E.H.2
-
58
-
-
80052196847
-
Impossibility of growing quantum bit commitments
-
Aug
-
S. Winkler, M. Tomamichel, S. Hengl, and R. Renner, "Impossibility of growing quantum bit commitments," Phys. Rev. Lett., vol. 107, p. 090502, Aug. 2011.
-
(2011)
Phys. Rev. Lett
, vol.107
, pp. 090502
-
-
Winkler, S.1
Tomamichel, M.2
Hengl, S.3
Renner, R.4
-
60
-
-
84968466834
-
Positive functions on C*-algebras
-
W. F. Stinespring, "Positive functions on C*-algebras," Proc. Amer. Math. Soc., vol. 6, no. 2, pp. 211-216, 1955.
-
(1955)
Proc. Amer. Math. Soc
, vol.6
, Issue.2
, pp. 211-216
-
-
Stinespring, W.F.1
-
61
-
-
84857779174
-
Unconditional security from noisy quantum storage
-
Mar
-
R. Konig, S. Wehner, and J. Wullschleger, "Unconditional security from noisy quantum storage," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1962-1984, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1962-1984
-
-
Konig, R.1
Wehner, S.2
Wullschleger, J.3
-
63
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding, "Probability inequalities for sums of bounded random variables," J. Amer. Statist. Assoc., vol. 58, no. 301, pp. 13-30, 1963.
-
(1963)
J. Amer. Statist. Assoc
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
64
-
-
77957004959
-
Sampling in a quantum population, and applications
-
New York, NY, USA: Springer-Verlag
-
N. J. Bouman and S. Fehr, "Sampling in a quantum population, and applications," in CRYPTO (Lecture Notes in Computer Science), vol. 6223. New York, NY, USA: Springer-Verlag, 2010, pp. 724-741.
-
(2010)
CRYPTO (Lecture Notes in Computer Science)
, vol.6223
, pp. 724-741
-
-
Bouman, N.J.1
Fehr, S.2
-
65
-
-
51849126899
-
Cryptographic complexity of multi-party computation problems: Classifications and separations
-
D. Wagner, Ed. Berlin, Germany: Springer-Verlag
-
M. Prabhakaran and M. Rosulek, "Cryptographic complexity of multi-party computation problems: Classifications and separations," in Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science), vol. 5157, D. Wagner, Ed. Berlin, Germany: Springer-Verlag, 2008, pp. 262-279.
-
(2008)
Advances in Cryptology - CRYPTO (Lecture Notes in Computer Science)
, vol.5157
, pp. 262-279
-
-
Prabhakaran, M.1
Rosulek, M.2
|