Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker
نویسنده
چکیده
We treat secret key extraction when the eavesdropper has correlated quantum states. We propose quantum privacy amplification theorems different from Renner’s, which are based on quantum conditional Rényi entropy of order 1 + s. Using those theorems, we derive an exponential decreasing rate for leaked information and the asymptotic equivocation rate.
منابع مشابه
Dual universality of hash functions and its applications to classical and quantum cryptography
In this paper, we introduce the concept of dual universality of hash functions and present its applications to various quantum and classical communication models including cryptography. We begin by establishing the one-to-one correspondence between a linear function family F and a code family C, and thereby defining ε-almost dual universal2 hash functions, as a generalization of the conventiona...
متن کاملPrivacy in Cyberspace
Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents incl...
متن کاملPrivacy Amplification Against Active Quantum Adversaries
Privacy amplification is the task by which two cooperating parties transform a shared weak secret, about which an eavesdropper may have side information, into a uniformly random string uncorrelated from the eavesdropper. Privacy amplification against passive adversaries, where it is assumed that the communication is over a public but authenticated channel, can be achieved in the presence of cla...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کاملLarge Deviation Analysis for Quantum Security via Smoothing of Rényi Entropy of Order 2
It is known that the security evaluation can be done by smoothing of Rényi entropy of order 2 in the classical and quantum settings when we apply universal2 hash functions. Using the smoothing of Rényi entropy of order 2, we derive security bounds for L1 distinguishability and modified mutual information criterion under the classical and quantum setting, and have derived these exponential decre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012