Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
暂无分享,去创建一个
[1] Rudolf Ahlswede,et al. Strong converse for identification via quantum channels , 2000, IEEE Trans. Inf. Theory.
[2] T. Rudolph,et al. Degrees of concealment and bindingness in quantum bit commitment protocols , 2001, quant-ph/0106019.
[3] Serge Fehr,et al. Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications , 2016, CRYPTO.
[4] Jonathan Katz,et al. Feasibility and Completeness of Cryptographic Tasks in the Quantum World , 2013, TCC.
[5] Louis Salvail,et al. Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography , 2015, ArXiv.
[6] Severin Winkler,et al. On the Efficiency of Classical and Quantum Secure Function Evaluation , 2012, IEEE Transactions on Information Theory.
[7] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[8] Justin M. Reyneri,et al. Coin flipping by telephone , 1984, IEEE Trans. Inf. Theory.
[9] C. Mochon. Quantum weak coin flipping with arbitrarily small bias , 2007, 0711.4114.
[10] Matthias Christandl,et al. Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.
[11] Jörn Müller-Quade,et al. On the (Im-)Possibility of Extending Coin Toss , 2006, Journal of Cryptology.
[12] Carlos Mochon. Quantum weak coin-flipping with bias of 0.192 , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[13] Renato Renner,et al. Simplifying information-theoretic arguments by post-selection , 2010, Quantum Cryptography and Computing.
[14] R W Spekkens,et al. Quantum protocol for cheat-sensitive weak coin flipping. , 2002, Physical review letters.
[15] E. Diamanti,et al. Experimental plug and play quantum coin flipping , 2013, Nature Communications.
[16] H. Nagaoka,et al. A new proof of the channel coding theorem via hypothesis testing in quantum information theory , 2002, Proceedings IEEE International Symposium on Information Theory,.
[17] H. Sommers,et al. Induced measures in the space of mixed quantum states , 2000, quant-ph/0012101.
[18] Gus Gutoski,et al. Toward a general theory of quantum games , 2006, STOC '07.
[19] Andris Ambainis,et al. A new protocol and lower bounds for quantum coin flipping , 2001, STOC '01.
[20] K. Audenaert,et al. Discriminating States: the quantum Chernoff bound. , 2006, Physical review letters.
[21] Serge Fehr,et al. Sampling in a Quantum Population, and Applications , 2009, CRYPTO.
[22] R. Renner. Symmetry of large physical systems implies independence of subsystems , 2007 .
[23] Iordanis Kerenidis,et al. Weak coin flipping with small bias , 2004, Inf. Process. Lett..
[24] M. Hayashi. Optimal sequence of quantum measurements in the sense of Stein's lemma in quantum hypothesis testing , 2002, quant-ph/0208020.
[25] Iordanis Kerenidis,et al. Optimal Quantum Strong Coin Flipping , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[26] Matthias Christandl,et al. One-and-a-Half Quantum de Finetti Theorems , 2007 .
[27] Andreas J. Winter,et al. Coding theorem and strong converse for quantum channels , 1999, IEEE Trans. Inf. Theory.
[28] C. Mochon. Large family of quantum weak coin-flipping protocols , 2005, quant-ph/0502068.
[29] Ivan Damgård,et al. On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation , 2015, International Conference on Information Technology & Systems.