Results 1 - 10
of
539
Quantum Privacy Amplification and the Security of Quantum Cryptography Over Noisy Channels
, 1996
"... Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel. Although they become operable if they are supplemented by classical privacy-amplification techniques, the resulting schemes are difficult to analyse and have not bee ..."
Abstract
-
Cited by 83 (1 self)
- Add to MetaCart
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel. Although they become operable if they are supplemented by classical privacy-amplification techniques, the resulting schemes are difficult to analyse and have
Generalized privacy amplification
- IEEE Transactions on Information Theory
, 1995
"... Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which ..."
Abstract
-
Cited by 325 (19 self)
- Add to MetaCart
results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity. Index Terms- Cryptography, secret-key agreement, uncondi-tional security, privacy amplification, wiretap channel, secrecy capacity, RCnyi entropy, universal hashing, quantum cryptogra-phy. I.
Limiting Privacy Breaches in Privacy Preserving Data Mining
- In PODS
, 2003
"... There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One approach for this problem is to randomize the values in individual records, and only disclose the randomized values. The mod ..."
Abstract
-
Cited by 301 (11 self)
- Add to MetaCart
satisfy a specified property, even though privacy is preserved on average. In this paper, we present a new formulation of privacy breaches, together with a methodology, "amplification", for limiting them. Unlike earlier approaches, amplification makes it is possible to guarantee limits
Multiple particle interference and quantum error correction
"... The concept of multiple particle interference is discussed, using insights provided by the classical theory of error correcting codes. This leads to a discussion of error correction in a quantum communication channel or a quantum computer. Methods of error correction in the quantum regime are presen ..."
Abstract
-
Cited by 171 (9 self)
- Add to MetaCart
with only a polynomial increase in the computing resources required. Therefore quantum computation can be made free of errors in the presence of physically realistic levels of decoherence. The methods also allow isolation of quantum communication from noise and evesdropping (quantum privacy amplification
Universally Composable Privacy Amplification against Quantum Adversaries
, 2004
"... Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We introduce a universally composable security definition for secret keys in a context where an adversary holds quantum information and show that privacy amplification by two-universal hashing is secu ..."
Abstract
-
Cited by 71 (12 self)
- Add to MetaCart
Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We introduce a universally composable security definition for secret keys in a context where an adversary holds quantum information and show that privacy amplification by two-universal hashing
Quantum amplitude amplification and estimation
, 2002
"... Abstract. Consider a Boolean function χ: X → {0, 1} that partitions set X between its good and bad elements, where x is good if χ(x) = 1 and bad otherwise. Consider also a quantum algorithm A such that A|0 〉 = � x∈X αx|x 〉 is a quantum superposition of the elements of X, and let a denote the proba ..."
Abstract
-
Cited by 174 (14 self)
- Add to MetaCart
Abstract. Consider a Boolean function χ: X → {0, 1} that partitions set X between its good and bad elements, where x is good if χ(x) = 1 and bad otherwise. Consider also a quantum algorithm A such that A|0 〉 = � x∈X αx|x 〉 is a quantum superposition of the elements of X, and let a denote
Simple and tight bounds for information reconciliation and privacy amplification
- In Advances in Cryptology—ASIACRYPT 2005, Lecture Notes in Computer Science
, 2005
"... Abstract. Shannon entropy is a useful and important measure in information processing, for instance, data compression or randomness extraction, under the assumption—which can typically safely be made in communication theory—that a certain random experiment is independently repeated many times. In cr ..."
Abstract
-
Cited by 59 (7 self)
- Add to MetaCart
sent through the quantum channel differently or even carry out coherent attacks, combining a number of particles together. In information-theoretic key agreement, the central functionalities of information reconciliation and privacy amplification have, therefore, been extensively studied
Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution
"... Privacy amplification is a necessary step in all quantum key distribution proto-cols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak to the attacker ..."
Abstract
- Add to MetaCart
Privacy amplification is a necessary step in all quantum key distribution proto-cols, and error correction is needed in each except when signals of many photons are used in the key communication in quantum noise approach. No security analysis of error correcting code information leak
Entanglement-based Quantum Computing by Diagrams of States
"... Abstract—We explore entanglement in composite quantum systems and how its peculiar properties are exploited in quantum information and communication protocols by means of Diagrams of States, a novel method to graphically represent and analyze how quantum information is elaborated during computations ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
privacy amplification based on entanglement purification. Diagrams of states prove to be a useful approach to analyze quantum computations, by offering an intuitive graphic representation of the processing of quantum information. They also help in conceiving novel quantum computations, from describing
Results 1 - 10
of
539