• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 539
Next 10 →

Quantum Privacy Amplification and the Security of Quantum Cryptography Over Noisy Channels

by David Deutsch, Artur Ekert, Richard Jozsa, Chiara Macchiavello, Sandu Popescu, Anna Sanpera , 1996
"... Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel. Although they become operable if they are supplemented by classical privacy-amplification techniques, the resulting schemes are difficult to analyse and have not bee ..."
Abstract - Cited by 83 (1 self) - Add to MetaCart
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel. Although they become operable if they are supplemented by classical privacy-amplification techniques, the resulting schemes are difficult to analyse and have

Generalized privacy amplification

by Charles H. Bennett, Gilles Brassard, Claude Crkpeau, Ueli M. Maurer, Senior Member - IEEE Transactions on Information Theory , 1995
"... Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which ..."
Abstract - Cited by 325 (19 self) - Add to MetaCart
results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity. Index Terms- Cryptography, secret-key agreement, uncondi-tional security, privacy amplification, wiretap channel, secrecy capacity, RCnyi entropy, universal hashing, quantum cryptogra-phy. I.

Limiting Privacy Breaches in Privacy Preserving Data Mining

by Alexandre Evfimievski, Johannes Gehrke, Ramakrishnan Srikant - In PODS , 2003
"... There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One approach for this problem is to randomize the values in individual records, and only disclose the randomized values. The mod ..."
Abstract - Cited by 301 (11 self) - Add to MetaCart
satisfy a specified property, even though privacy is preserved on average. In this paper, we present a new formulation of privacy breaches, together with a methodology, "amplification", for limiting them. Unlike earlier approaches, amplification makes it is possible to guarantee limits

Multiple particle interference and quantum error correction

by Andrew Steane
"... The concept of multiple particle interference is discussed, using insights provided by the classical theory of error correcting codes. This leads to a discussion of error correction in a quantum communication channel or a quantum computer. Methods of error correction in the quantum regime are presen ..."
Abstract - Cited by 171 (9 self) - Add to MetaCart
with only a polynomial increase in the computing resources required. Therefore quantum computation can be made free of errors in the presence of physically realistic levels of decoherence. The methods also allow isolation of quantum communication from noise and evesdropping (quantum privacy amplification

Universally Composable Privacy Amplification against Quantum Adversaries

by Renato Renner, Robert König , 2004
"... Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We introduce a universally composable security definition for secret keys in a context where an adversary holds quantum information and show that privacy amplification by two-universal hashing is secu ..."
Abstract - Cited by 71 (12 self) - Add to MetaCart
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We introduce a universally composable security definition for secret keys in a context where an adversary holds quantum information and show that privacy amplification by two-universal hashing

Quantum amplitude amplification and estimation

by Gilles Brassard, Peter Høyer, Michele Mosca , 2002
"... Abstract. Consider a Boolean function χ: X → {0, 1} that partitions set X between its good and bad elements, where x is good if χ(x) = 1 and bad otherwise. Consider also a quantum algorithm A such that A|0 〉 = � x∈X αx|x 〉 is a quantum superposition of the elements of X, and let a denote the proba ..."
Abstract - Cited by 174 (14 self) - Add to MetaCart
Abstract. Consider a Boolean function χ: X → {0, 1} that partitions set X between its good and bad elements, where x is good if χ(x) = 1 and bad otherwise. Consider also a quantum algorithm A such that A|0 〉 = � x∈X αx|x 〉 is a quantum superposition of the elements of X, and let a denote

Simple and tight bounds for information reconciliation and privacy amplification

by Renato Renner, Stefan Wolf - In Advances in Cryptology—ASIACRYPT 2005, Lecture Notes in Computer Science , 2005
"... Abstract. Shannon entropy is a useful and important measure in information processing, for instance, data compression or randomness extraction, under the assumption—which can typically safely be made in communication theory—that a certain random experiment is independently repeated many times. In cr ..."
Abstract - Cited by 59 (7 self) - Add to MetaCart
sent through the quantum channel differently or even carry out coherent attacks, combining a number of particles together. In information-theoretic key agreement, the central functionalities of information reconciliation and privacy amplification have, therefore, been extensively studied

Introduction: Quantum key distribution Privacy Amplification

by Bayat Movahed
"... ..."
Abstract - Add to MetaCart
Abstract not found

Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

by Horace P. Yuen
"... Privacy amplification is a necessary step in all quantum key distribution proto-cols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker ..."
Abstract - Add to MetaCart
Privacy amplification is a necessary step in all quantum key distribution proto-cols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak

Entanglement-based Quantum Computing by Diagrams of States

by Sara Felloni, Giuliano Strini
"... Abstract—We explore entanglement in composite quantum systems and how its peculiar properties are exploited in quantum information and communication protocols by means of Diagrams of States, a novel method to graphically represent and analyze how quantum information is elaborated during computations ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
privacy amplification based on entanglement purification. Diagrams of states prove to be a useful approach to analyze quantum computations, by offering an intuitive graphic representation of the processing of quantum information. They also help in conceiving novel quantum computations, from describing
Next 10 →
Results 1 - 10 of 539
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University