Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-642-35656-8_11
DC Field | Value | |
---|---|---|
dc.title | Quantum security analysis via smoothing of Renyi entropy of order 2 | |
dc.contributor.author | Hayashi, M. | |
dc.date.accessioned | 2016-09-01T07:17:51Z | |
dc.date.available | 2016-09-01T07:17:51Z | |
dc.date.issued | 2013 | |
dc.identifier.isbn | 9783642356551 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/126347 | |
dc.description.abstract | It is known that the security evaluation can be done by smoothing of Rényi entropy of order 2 in the quantum setting when we apply universal2 hash functions. This fact can be extended to the case when we apply ε-almost dual universal2 hash functions, which is a generalized concept of universal2 hash functions. Demonstrating the smoothing of Rényi entropy of order 2, we derived security bounds for universal composability and mutual information criterion under the condition in the quantum setting. © Springer-Verlag Berlin Heidelberg 2013. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-35656-8_11 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | CENTRE FOR QUANTUM TECHNOLOGIES | |
dc.description.doi | 10.1007/978-3-642-35656-8_11 | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 7582 LNCS | |
dc.description.page | 128-140 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.