Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications
From MaRDI portal
Publication:5346278
DOI10.1109/TIT.2013.2278971zbMath1364.94579arXiv1010.1358OpenAlexW2027642452MaRDI QIDQ5346278
Publication date: 8 June 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1010.1358
Cryptography (94A60) Measures of information, entropy (94A17) Authentication, digital signatures and secret sharing (94A62)
Related Items (7)
Semantic security for quantum wiretap channels ⋮ Relating different quantum generalizations of the conditional Rényi entropy ⋮ Information Theoretic Security for Encryption Based on Conditional Rényi Entropies ⋮ Position-based coding and convex splitting for private communication over quantum channels ⋮ Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths ⋮ A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage ⋮ Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker
This page was built for publication: Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications