A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
暂无分享,去创建一个
Ivan Damgård | Serge Fehr | Louis Salvail | Christian Schaffner | Renato Renner | I. Damgård | R. Renner | Christian Schaffner | L. Salvail | S. Fehr
[1] U. Larsen. Superspace geometry: the exact uncertainty relationship between complementary aspects , 1990 .
[2] Ivan Damgård,et al. On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission , 2004, EUROCRYPT.
[3] K R W Jones. Riemann-Liouville fractional integration and reduced distributions on hyperspheres , 1991 .
[4] R. Renner,et al. Information-theoretic security proof for quantum-key-distribution protocols (17 pages) , 2005 .
[5] R. Jozsa,et al. Lower bound for accessible information in quantum mechanics. , 1994, Physical review. A, Atomic, molecular, and optical physics.
[6] Larry Carter,et al. Universal classes of hash functions (Extended Abstract) , 1977, STOC '77.
[7] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[8] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[9] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[10] Stanislav Sýkora,et al. Quantum theory and the bayesian inference problems , 1974 .
[11] Larry Carter,et al. New classes and applications of hash functions , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[12] Iwo Bialynicki-Birula. Formulation of the uncertainty relations in terms of the Rényi entropies , 2006 .
[13] Renato Renner,et al. Simple and Tight Bounds for Information Reconciliation and Privacy Amplification , 2005, ASIACRYPT.
[14] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[15] Maassen,et al. Generalized entropic uncertainty relations. , 1988, Physical review letters.
[16] Ivan Damgård,et al. Oblivious Transfer and Linear Functions , 2006, CRYPTO.
[17] Jorge Sánchez-Ruiz. Improved bounds in the entropic uncertainty and certainty relations for complementary observables , 1995 .
[18] Kazuoki Azuma. WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .
[19] Oded Goldreich,et al. Comparing entropies in statistical zero knowledge with applications to the structure of SZK , 1999, Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317).
[20] R. Renner,et al. An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.
[21] D. Deutsch. Uncertainty in Quantum Measurements , 1983 .
[22] Robert König,et al. Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.
[23] Ivan Damgård,et al. Cryptography in the bounded quantum-storage model , 2005, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005..
[24] Christian Cachin,et al. Smooth Entropy and Rényi Entropy , 1997, EUROCRYPT.
[25] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[26] J. Hilgevoord,et al. The Mathematical Expression of the Uncertainty Principle , 1988 .
[27] Jorge Sánchez,et al. Entropic uncertainty and certainty relations for complementary observables , 1993 .
[28] Jürg Wullschleger. Oblivious-transfer amplification , 2007, Ausgezeichnete Informatikdissertationen.
[29] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[30] Christian Schaffner,et al. Information-Theoretic Conditions for Two-Party Secure Function Evaluation , 2006, EUROCRYPT.
[31] Louis Salvail,et al. Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation , 2000, EUROCRYPT.
[32] Kraus. Complementary observables and uncertainty relations. , 1987, Physical review. D, Particles and fields.
[33] I. Bialynicki-Birula,et al. Uncertainty relations for information entropy in wave mechanics , 1975 .
[34] N. Gisin,et al. Optimal Eavesdropping in Quantum Cryptography. I , 1997, quant-ph/9701039.
[35] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[36] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[37] N. Lutkenhaus. Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.
[38] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[39] N. Gisin,et al. OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .
[40] Noga Alon,et al. The Probabilistic Method, Second Edition , 2004 .