Optimal Security Proofs for Full Domain Hash, Revisited

2017 ◽  
Vol 31 (1) ◽  
pp. 276-306 ◽  
Author(s):  
Saqib A. Kakvi ◽  
Eike Kiltz
Keyword(s):  
2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Peter Brown ◽  
Hamza Fawzi ◽  
Omar Fawzi

AbstractThe rates of quantum cryptographic protocols are usually expressed in terms of a conditional entropy minimized over a certain set of quantum states. In particular, in the device-independent setting, the minimization is over all the quantum states jointly held by the adversary and the parties that are consistent with the statistics that are seen by the parties. Here, we introduce a method to approximate such entropic quantities. Applied to the setting of device-independent randomness generation and quantum key distribution, we obtain improvements on protocol rates in various settings. In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution without additional preprocessing. Furthermore, we show that our construction can be readily combined with the entropy accumulation theorem in order to establish full finite-key security proofs for these protocols.


2014 ◽  
Vol 69 ◽  
pp. 34-42 ◽  
Author(s):  
Duygu Nizamogullari ◽  
İpek Özkal-Sanver

2021 ◽  
Vol 34 (1) ◽  
Author(s):  
Shuichi Katsumata ◽  
Shota Yamada ◽  
Takashi Yamakawa

2015 ◽  
pp. 1431-1436
Author(s):  
Qingqing Hu ◽  
Junqiang Liu ◽  
Yongsheng Wu ◽  
Shijian Xu ◽  
Mengtao Xu
Keyword(s):  

2021 ◽  
Author(s):  
José Bacelar Almeida ◽  
Manuel Barbosa ◽  
Manuel L. Correia ◽  
Karim Eldefrawy ◽  
Stéphane Graham-Lengrand ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document