0403133v2

related topics
{key, protocol, security}
{let, theorem, proof}
{information, entropy, channel}
{operator, operators, space}
{states, state, optimal}
{algorithm, log, probability}
{vol, operators, histories}

Universally composable privacy amplification against quantum adversaries

Renato Renner, Robert Koenig

abstract: Privacy amplification is the art of shrinking a partially secret string Z to a highly secret key S. We show that, even if an adversary holds quantum information about the initial string Z, the key S obtained by two-universal hashing is secure, according to a universally composable security definition. Additionally, we give an asymptotically optimal lower bound on the length of the extractable key S in terms of the adversary's (quantum) knowledge about Z. Our result has applications in quantum cryptography. In particular, it implies that many of the known quantum key distribution protocols are universally composable.

oai_identifier:
oai:arXiv.org:quant-ph/0403133
categories:
quant-ph
comments:
14 pages, LaTeX; references and detailed discussion of optimality added
arxiv_id:
quant-ph/0403133
journal_ref:
Proc. of TCC 2005, LNCS, Springer, vol. 3378 (2005)
created:
2004-03-18
updated:
2004-04-15

Full article ▸

related documents
9810067v3
9911043v5
0009113v1
0505108v1
0503192v4
0608030v3
0310168v2
0107130v1
9910087v2
0410215v2
0503002v1
9703035v1
0503157v1
9904091v1
0409099v2
0703099v5
0410017v2
0405111v2
0603234v1
0611145v1
9910106v2
0703069v1
0307104v3
0509211v1
0511163v2