Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Simple and Tight Bounds for Information Reconciliation and Privacy Amplification - MaRDI portal

Simple and Tight Bounds for Information Reconciliation and Privacy Amplification

From MaRDI portal
Publication:5451071

DOI10.1007/11593447_11zbMath1154.94471OpenAlexW2150154572MaRDI QIDQ5451071

Renato Renner, Stefan Wolf

Publication date: 18 March 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11593447_11




Related Items (25)

Shannon Entropy Versus Renyi Entropy from a Cryptographic ViewpointTowards a reverse Newman's theorem in interactive information complexityThe conditional average entropiesInformation Theoretic Security for Encryption Based on Conditional Rényi EntropiesWireless-channel key exchangeBounds for smooth min- and max-entropyWhen Are Fuzzy Extractors Possible?Quantum key distribution with PRF(Hash, Nonce) achieves everlasting securityOne-way functions using algorithmic and classical information theoriesComposable Security in the Bounded-Quantum-Storage ModelEntropy accumulationEvaluating Entropy for True Random Number Generators: Efficient, Robust and Provably SecureLong term confidentiality: a surveyOn the Complexity of Breaking PseudoentropySimple and Tight Device-Independent Security ProofsOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesSimple one-shot bounds for various source coding problems using smooth Rényi quantitiesSharp lower bounds on the extractable randomness from non-uniform sourcesA joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakageRandomness Extraction Via δ-Biased Masking in the Presence of a Quantum AttackerDimension Reduction for Polynomials over Gaussian Space and ApplicationsPlacing conditional disclosure of secrets in the communication complexity universePrecise evaluation of leaked information with secure randomness extraction in the presence of quantum attackerThe Complexity of Differential PrivacyMosaics of combinatorial designs for information-theoretic security







This page was built for publication: Simple and Tight Bounds for Information Reconciliation and Privacy Amplification