Composable Security in the Bounded-Quantum-Storage Model
From MaRDI portal
Publication:3519536
DOI10.1007/978-3-540-70583-3_49zbMath1155.94389OpenAlexW1848033392MaRDI QIDQ3519536
Stephanie Wehner, Jürg Wullschleger
Publication date: 19 August 2008
Published in: Automata, Languages and Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70583-3_49
Related Items (4)
Long-term security and universal composability ⋮ Quantum cryptography beyond quantum key distribution ⋮ An integrated hierarchical dynamic quantum secret sharing protocol ⋮ Two-sided bounds on minimum-error quantum measurement, on the reversibility of quantum dynamics, and on maximum overlap using directional iterates
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Universal classes of hash functions
- Security and composition of multiparty cryptographic protocols
- Zero-knowledge against quantum attacks
- Security of Quantum Bit String Commitment Depends on the Information Measure
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Universally composable two-party and multi-party secure computation
- Composing Quantum Protocols in a Classical Environment
- Coin flipping by telephone a protocol for solving impossible problems
- Quantum Oblivious Transfer
- Symmetric Authentication within a Simulatable Cryptographic Library
- Oblivious-Transfer Amplification
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Theory of Cryptography
This page was built for publication: Composable Security in the Bounded-Quantum-Storage Model