Skip to main content

Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2

  • Conference paper
Book cover Theory of Quantum Computation, Communication, and Cryptography (TQC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7582))

Included in the following conference series:

Abstract

It is known that the security evaluation can be done by smoothing of Rényi entropy of order 2 in the quantum setting when we apply universal2 hash functions. This fact can be extended to the case when we apply ε-almost dual universal2 hash functions, which is a generalized concept of universal2 hash functions. Demonstrating the smoothing of Rényi entropy of order 2, we derived security bounds for universal composability and mutual information criterion under the condition in the quantum setting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carter, J.L., Wegman, M.N.: Universal Classes of Hash Functions. J. Comput. System Sci. 18, 143–154 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  2. Wegman, M.N., Carter, J.L.: New Hash Functions and Their Use in Authentication and Set Inequality. J. Comput. System Sci. 22, 265–279 (1981)

    Article  MathSciNet  MATH  Google Scholar 

  3. Mansour, Y., Nisan, N., Tiwari, P.: The Computational Complexity of Universal Hashing. In: STOC 1990, Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing, pp. 235–243 (1990)

    Google Scholar 

  4. Bennett, C.H., Brassard, G., Crepeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Transactions on Information Theory 41, 1915–1923 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  5. Golub, G.H., Van Loan, C.F.: Matrix Computation, 3rd edn. The John Hopkins University Press (1996)

    Google Scholar 

  6. Renner, R.: Security of Quantum Key Distribution. PhD thesis, Dipl. Phys. ETH, Switzerland, 2005; arXiv:quantph/0512258 (2005)

    Google Scholar 

  7. Dodis, Y., Smith, A.: Correcting Errors Without Leaking Partial Information. In: STOC 2005, pp. 654–663 (2005)

    Google Scholar 

  8. Fehr, S., Schaffner, C.: Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 465–481. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Hayashi, M.: Quantum Information: An Introduction. Springer (2006)

    Google Scholar 

  10. Hayashi, M.: Upper bounds of eavesdropper’s performances in finite-length code with the decoy method. Physical Review A 76, 012329 (2007); Physical Review A 79, 019901(E) (2009)

    Google Scholar 

  11. Hayashi, M.: Tight exponential evaluation for universal composablity with privacy amplification and its applications. arXiv:1010.1358 (2010)

    Google Scholar 

  12. Hayashi, M.: Exponential decreasing rate of leaked information in universal random privacy amplification. IEEE Transactions on Information Theory 57(6), 3989–4001 (2011)

    Article  Google Scholar 

  13. Tsurumaru, T., Hayashi, M.: Dual universality of hash functions and its applications to quantum cryptography. arXiv:1101.0064 (2011)

    Google Scholar 

  14. Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A Pseudorandom Generator from any One-way Function. SIAM J. Comput. 28, 1364 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  15. Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. Lond. A, 461, 207–235 (2005)

    Google Scholar 

  16. Hayashi, M.: Classical and quantum security analysis via smoothing of Renyi entropy of order 2. arXiv:1202.0322 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hayashi, M. (2013). Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2. In: Iwama, K., Kawano, Y., Murao, M. (eds) Theory of Quantum Computation, Communication, and Cryptography. TQC 2012. Lecture Notes in Computer Science, vol 7582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35656-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35656-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35655-1

  • Online ISBN: 978-3-642-35656-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics