The odyssey of entropy: cryptography

B Zolfaghari, K Bibak, T Koshiba - Entropy, 2022 - mdpi.com
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …

A hierarchy of information quantities for finite block length analysis of quantum tasks

M Tomamichel, M Hayashi - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
We consider two fundamental tasks in quantum information theory, data compression with
quantum side information, as well as randomness extraction against quantum side …

Wiretap channels: Nonasymptotic fundamental limits

W Yang, RF Schaefer, HV Poor - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the maximal secret communication rate over a wiretap channel
subject to reliability and secrecy constraints at a given blocklength. New achievability and …

More efficient privacy amplification with less random seeds via dual universal hash function

M Hayashi, T Tsurumaru - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
We explicitly construct random hash functions for privacy amplification (extractors) that
require smaller random seed lengths than the previous literature, and still allow efficient …

Finite-blocklength bounds for wiretap channels

W Yang, RF Schaefer, HV Poor - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability
and secrecy constraints at a given blocklength. New achievability and converse bounds are …

Converses for secret key agreement and secure computing

H Tyagi, S Watanabe - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
We consider information theoretic secret key (SK) agreement and secure function
computation by multiple parties observing correlated data, with access to an interactive …

Optimal second-order rates for quantum soft covering and privacy amplification

YC Shen, L Gao, HC Cheng - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
We study quantum soft covering and privacy amplification against quantum side information.
The former task aims to approximate a quantum state by sampling from a prior distribution …

Tight exponential analysis of universally composable privacy amplification and its applications

M Hayashi - IEEE Transactions on Information Theory, 2013 - ieeexplore.ieee.org
Motivated by the desirability of universal composability, we analyze in terms of L1
distinguishability the task of secret key generation from a joint random variable. Under this …

Privacy amplification against quantum side information via regular random binning

YC Shen, L Gao, HC Cheng - 2023 59th Annual Allerton …, 2023 - ieeexplore.ieee.org
We consider privacy amplification against quantum side information by using regular
random binning as an effective extractor. For constant-type sources, we obtain error …

Partially smoothed information measures

A Anshu, M Berta, R Jain… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Smooth entropies are a tool for quantifying resource trade-offs in (quantum) information
theory and cryptography. In typical bi-and multi-partite problems, however, some of the sub …