The private classical capacity and quantum capacity of a quantum channel

I Devetak - IEEE Transactions on Information Theory, 2005 - ieeexplore.ieee.org
A formula for the capacity of a quantum channel for transmitting private classical information
is derived. This is shown to be equal to the capacity of the channel for generating a secret …

Exponential decreasing rate of leaked information in universal random privacy amplification

M Hayashi - IEEE Transactions on Information Theory, 2011 - ieeexplore.ieee.org
We derive a new upper bound for Eve's information in secret key generation from a common
random number without communication. This bound improves on Bennett's bound based on …

General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel

M Hayashi - IEEE Transactions on Information Theory, 2006 - ieeexplore.ieee.org
Several nonasymptotic formulas are established in channel resolvability and identification
capacity, and they are applied to the wiretap channel. By using these formulas, the epsi …

A resource framework for quantum Shannon theory

I Devetak, AW Harrow, AJ Winter - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Quantum Shannon theory is loosely defined as a collection of coding theorems, such as
classical and quantum source compression, noisy channel coding theorems, entanglement …

Applications of coherent classical communication and the Schur transform to quantum information theory

AW Harrow - arXiv preprint quant-ph/0512255, 2005 - arxiv.org
Quantum mechanics has led not only to new physical theories, but also a new
understanding of information and computation. Quantum information began by yielding new …

Oblivious transfer is symmetric

S Wolf, J Wullschleger - Annual International Conference on the Theory …, 2006 - Springer
We show that oblivious transfer of bits from A to B can be obtained from a single instance of
the same primitive from B to A. Our reduction is perfect and shows that oblivious transfer is in …

[图书][B] Nanometer structures: theory, modeling, and simulation

A Lakhtakia - 2004 - books.google.com
This volume is a researcher's reference handbook to the many aspects of nanometer
structures. Although intended as a source for the serious researcher, novices will find a great …

Efficient unconditional oblivious transfer from almost any noisy channel

C Crépeau, K Morozov, S Wolf - … , SCN 2004, Amalfi, Italy, September 8-10 …, 2005 - Springer
Oblivious transfer (OT) is a cryptographic primitive of central importance, in particular in two-
and multi-party computation. There exist various protocols for different variants of OT, but …

Reexamination of quantum bit commitment: The possible and the impossible

GM D'Ariano, D Kretschmann, D Schlingemann… - Physical Review A …, 2007 - APS
Bit commitment protocols whose security is based on the laws of quantum mechanics alone
are generally held to be impossible. We give a strengthened and explicit proof of this result …

Converses for secret key agreement and secure computing

H Tyagi, S Watanabe - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
We consider information theoretic secret key (SK) agreement and secure function
computation by multiple parties observing correlated data, with access to an interactive …