2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282763
|View full text |Cite
|
Sign up to set email alerts
|

More efficient privacy amplification with less random seeds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 29 publications
0
6
1
Order By: Relevance
“…We remark that the construction of Dodis et al [DEOR04] is based on universal hash functions. These are already known to be good quantum-proof seeded extractors [RK05,TSSR11,HT15]. Recently, Hayashi and Tsurumaru [HT15] proved that they are also good quantum-proof extractors if the seed is not uniform.…”
Section: Lemma 20 ([Deor04]mentioning
confidence: 99%
See 2 more Smart Citations
“…We remark that the construction of Dodis et al [DEOR04] is based on universal hash functions. These are already known to be good quantum-proof seeded extractors [RK05,TSSR11,HT15]. Recently, Hayashi and Tsurumaru [HT15] proved that they are also good quantum-proof extractors if the seed is not uniform.…”
Section: Lemma 20 ([Deor04]mentioning
confidence: 99%
“…These are already known to be good quantum-proof seeded extractors [RK05,TSSR11,HT15]. Recently, Hayashi and Tsurumaru [HT15] proved that they are also good quantum-proof extractors if the seed is not uniform. Using some of our proof techniques, the result of Hayashi and Tsurumaru can be generalised to obtain a different proof that the construction of Dodis et al is a two-source extractor in the Markov model.…”
Section: Lemma 20 ([Deor04]mentioning
confidence: 99%
See 1 more Smart Citation
“…A claiming message is the message that provides the identity and the location of a neighbor node which is the examinee of the observer. The observer sends this claiming message over the overlay network attached with a key, which is the hash of the identity of the examinee concatenated with the random seed [17]. The destination to which this message must be sent is decided based on the key valued attached.…”
Section: Distributed Detection Protocolmentioning
confidence: 99%
“…We thus demand the extractor's output to be uniform with respect to the side information. There are lots of research on strong extractor in the presence of classical or quantum side information [17][18][19][20][21][22] . But for non-malleable extractor, little is known about the security in the presence of side information.…”
Section: Introductionmentioning
confidence: 99%