DocumentCode :
1048031
Title :
The Bounded-Storage Model in the Presence of a Quantum Adversary
Author :
König, Robert T. ; Terhal, Barbara M.
Author_Institution :
Quantum inf., California Inst. of Technol., Pasadena, CA, USA
Volume :
54
Issue :
2
fYear :
2008
Firstpage :
749
Lastpage :
762
Abstract :
An extractor is a function that is used to extract randomness. Given an imperfect random source X and a uniform seed Y, the output E(X,Y) is close to uniform. We study properties of such functions in the presence of prior quantum information about X, with a particular focus on cryptographic applications. We prove that certain extractors are suitable for key expansion in the bounded-storage model where the adversary has a limited amount of quantum memory. For extractors with one-bit output we show that the extracted bit is essentially equally secure as in the case where the adversary has classical resources. We prove the security of certain constructions that output multiple bits in the bounded-storage model.
Keywords :
quantum cryptography; random processes; bounded-storage model; cryptographic applications; imperfect random source; quantum adversary; quantum information; quantum memory; randomness; uniform seed; Australia; Complexity theory; Computer science; Cryptography; Data mining; Helium; Information security; Information theory; Privacy; Quantum mechanics; Bounded-storage model; cryptography; extractors; locking; privacy amplification; quantum information theory; quantum key distribution; quantum memory; security proofs; universal composability;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2007.913245
Filename :
4439854
Link To Document :
بازگشت