Acknowledgement
Grant : 양자암호통신망 구축을 통한 신뢰성 검증기술 및 QKD 고도화를 위한 핵심요소기술 개발
Supported by : 정보통신기술진흥센터
References
- A. De, C. Portmann, T. Vidick, and R. Renner, Trevisan's extractor in the presence of quantum side information [Online]. Available: arXiv:0912.5514 https://doi.org/10.1137/100813683
- C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Comput. Syst. Signal Process., Bangalore, India, Dec. 1984, pp. 175-179.
- C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995. https://doi.org/10.1109/18.476316
- G. Brassard and L. Salvail, T. Helleseth, Ed., "Secret-key reconciliation by public discussion," in Proc. Adv. Cryptol.-Eurocrypt, 1994, vol. 765, LNCS, pp. 410-423.
- J. L. Carter and M. N.Wegman, "Universal classes of hash functions,"J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979. https://doi.org/10.1016/0022-0000(79)90044-8
- I. Csiszar, "Almost independence and secrecy capacity," Probl. Inf. Transmiss., vol. 32, no. 1, pp. 40-47, 1996.
- I. Csiszar and J. Karner, Information Theory: Coding Theorem for Discrete Memoryless Systems. New York, NY, USA: Academic, 1981.
- Y. Dodis and A. Smith, "Correcting errors without leaking partial information,"in Proc. 37th Annu. ACM Symp. Theory Comput., 2005, pp. 654-663.
- S. Fehr and C. Schaffner, "Randomness extraction via delta-biased masking in the presence of a quantum attacker," in Proc. Theory Cryptogr. Conf., 2008, pp. 465-481.
- D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," J. Quant. Inf. Comput., vol. 5, pp. 325-360, 2004.