2012
DOI: 10.1137/100813683
|View full text |Cite
|
Sign up to set email alerts
|

Trevisan's Extractor in the Presence of Quantum Side Information

Abstract: Randomness extraction involves the processing of purely classical information and is therefore usually studied in the framework of classical probability theory. However, such a classical treatment is generally too restrictive for applications where side information about the values taken by classical random variables may be represented by the state of a quantum system. This is particularly relevant in the context of cryptography, where an adversary may make use of quantum devices. Here, we show that the well k… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
199
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 125 publications
(200 citation statements)
references
References 35 publications
1
199
0
Order By: Relevance
“…There exist other protocol families that extract the min-entropy against quantum adversaries, for example based on almost two-universal hashing [160] or Trevisan's extractors [46]. These families are considered mainly because they need a smaller seed or can be implemented more efficiently than two-universal hashing.…”
Section: Background and Further Readingmentioning
confidence: 99%
“…There exist other protocol families that extract the min-entropy against quantum adversaries, for example based on almost two-universal hashing [160] or Trevisan's extractors [46]. These families are considered mainly because they need a smaller seed or can be implemented more efficiently than two-universal hashing.…”
Section: Background and Further Readingmentioning
confidence: 99%
“…The concept of side-information-independent randomness, which includes privacy amplification and randomness extraction, is well established in both classical and quantuminformation theory [33][34][35][36]. This security aspect of randomness generation started to get considerable attention recently in the framework of QRNG [13, 20-23, 26, 27, 37].…”
Section: Entropy Quantificationmentioning
confidence: 99%
“…Needless to say, given more bits, there are more sophisticated ways of achieving secrecy, to mention only two-universal hash functions 47 …”
Section: Less Reality More Securitymentioning
confidence: 99%