1: \newcommand{\etalchar}[1]{$^{#1}$}
2: \begin{thebibliography}{BOHL{\etalchar{+}}05}
3:
4: \bibitem[ABB{\etalchar{+}}04]{ABBBMMT04}
5: A.~Ac\'in, J.~Bae, E.~Bagan, M.~Baig, Ll. Masanes, and R.~{Mu\~{n}oz}-Tapia.
6: \newblock Secrecy content of two-qubit states.
7: \newblock \url{http://arxiv.org/abs/quant-ph/0411092}, November 2004.
8:
9: \bibitem[Bar05]{Bariska05}
10: A.~Bariska.
11: \newblock On a weakness of common security definitions for {QKD} protocols.
12: \newblock Master's thesis, ETH Z\"urich, March 2005.
13: \newblock See also \url{http://arxiv.org/abs/quant-ph/0512021}.
14:
15: \bibitem[BB84]{BenBra84}
16: C.~H. Bennett and G.~Brassard.
17: \newblock Quantum cryptography: Public-key distribution and coin tossing.
18: \newblock In {\em Proceedings of IEEE International Conference on Computers,
19: Systems and Signal Processing}, pages 175--179, 1984.
20:
21: \bibitem[BBB{\etalchar{+}}02]{BBBGM02}
22: E.~Biham, M.~Boyer, G.~Brassard, J.~van~de Graaf, and T.~Mor.
23: \newblock Security of quantum key distribution against all collective attacks.
24: \newblock {\em Algorithmica}, 34:372--388, 2002.
25:
26: \bibitem[BBB{\etalchar{+}}05]{BBBMR05}
27: E.~Biham, M.~Boyer, P.~O. Boykin, T.~Mor, and V.~Roychowdhury.
28: \newblock A proof of the security of quantum key distribution.
29: \newblock {\em Journal of Cryptology}, 2005.
30: \newblock to appear.
31:
32: \bibitem[BBCM95]{BBCM95}
33: C.~H. Bennett, G.~Brassard, C.~Cr{\'e}peau, and U.~Maurer.
34: \newblock Generalized privacy amplification.
35: \newblock {\em IEEE Transaction on Information Theory}, 41(6):1915--1923, 1995.
36:
37: \bibitem[BBM92]{BeBrMe92}
38: C.~H. Bennett, G.~Brassard, and N.~D. Mermin.
39: \newblock Quantum cryptography without {Bell's} theorem.
40: \newblock {\em Phys.\ Rev.\ Lett.}, 68:557--559, 1992.
41:
42: \bibitem[BBP{\etalchar{+}}96]{BBPSSW96}
43: C.~H. Bennett, G.~Brassard, S.~Popescu, B.~Schumacherand~J. Smolin, and
44: W.~Wootters.
45: \newblock Purification of noisy entanglement and faithful teleportation via
46: noisy channels.
47: \newblock {\em Phys.\ Rev.\ Lett.}, 76:722--726, 1996.
48:
49: \bibitem[BBR88]{BeBrRo88}
50: C.~H. Bennett, G.~Brassard, and J.-M. Robert.
51: \newblock Privacy amplification by public discussion.
52: \newblock {\em SIAM Journal on Computing}, 17(2):210--229, 1988.
53:
54: \bibitem[Ben92]{Bennet92}
55: C.~H. Bennett.
56: \newblock Quantum cryptography using any two nonorthogonal states.
57: \newblock {\em Phys.\ Rev.\ Lett.}, 68(21):3121--3124, 1992.
58:
59: \bibitem[Bir46]{Birkho46}
60: G.~Birkhoff.
61: \newblock Three observations on linear algebra.
62: \newblock {\em Univ.\ Nac.\ Tucum\'an. Rev. Ser. A}, 5:147--151, 1946.
63:
64: \bibitem[BM97a]{BihMor97b}
65: E.~Biham and T.~Mor.
66: \newblock Bounds on information and the security of quantum cryptography,.
67: \newblock {\em Phys.\ Rev.\ Lett.}, 79:4034--4037, 1997.
68:
69: \bibitem[BM97b]{BihMor97a}
70: E.~Biham and T.~Mor.
71: \newblock Security of quantum cryptography against collective attacks.
72: \newblock {\em Phys.\ Rev.\ Lett.}, 78(11):2256--2259, 1997.
73:
74: \bibitem[BMS96]{BeMoSm96}
75: C.~H. Bennett, T.~Mor, and J.~A. Smolin.
76: \newblock The parity bit in quantum cryptography.
77: \newblock {\em Phys.\ Rev.\ A}, 54:2675--2684, 1996.
78:
79: \bibitem[BOHL{\etalchar{+}}05]{BHLMO05}
80: M.~Ben-Or, M.~Horodecki, D.~W. Leung, D.~Mayers, and J.~Oppenheim.
81: \newblock The universal composable security of quantum key distribution.
82: \newblock In {\em Second Theory of Cryptography Conference {TCC}}, volume 3378
83: of {\em Lecture Notes in Computer Science}, pages 386--406. Springer, 2005.
84: \newblock Also available at \url{http://arxiv.org/abs/quant-ph/0409078}.
85:
86: \bibitem[BOM04]{BenMay04}
87: M.~Ben-Or and D.~Mayers.
88: \newblock General security definition and composability for quantum and
89: classical protocols.
90: \newblock \url{http://arxiv.org/abs/quant-ph/0409062}, September 2004.
91:
92: \bibitem[BPG99]{BecGis99}
93: H.~Bechmann-Pasquinucci and N.~Gisin.
94: \newblock Incoherent and coherent eavesdropping in the six-state protocol of
95: quantum cryptography.
96: \newblock {\em Phys.\ Rev.\ A,}, 59:4238, 1999.
97:
98: \bibitem[Bru98]{Bruss98}
99: D.~Bruss.
100: \newblock Optimal eavesdropping in quantum cryptography with six states.
101: \newblock {\em Phys.\ Rev.\ Lett.}, 81:3018, 1998.
102:
103: \bibitem[BS94]{BraSal94}
104: G.~Brassard and L.~Salvail.
105: \newblock Secret-key reconciliation by public discussion.
106: \newblock In {\em Advances of Cryptology --- \mbox{EUROCRYPT '93}}, Lecture
107: Notes in Computer Science, pages 410--423. Springer, 1994.
108:
109: \bibitem[Can01]{Canetti01}
110: R.~Canetti.
111: \newblock Universally composable security: A new paradigm for cryptographic
112: protocols.
113: \newblock In {\em Proc.\ 42nd IEEE Symposium on Foundations of Computer Science
114: (FOCS)}, pages 136--145, 2001.
115:
116: \bibitem[CFS02]{CaFuSh02}
117: C.~M. Caves, C.~A. Fuchs, and R.~Schack.
118: \newblock Unknown quantum states: The quantum de {Finetti} representation.
119: \newblock {\em Journal of Mathematical Physics}, page 4537, 2002.
120:
121: \bibitem[Cha02]{Chau02}
122: H.~F.\ Chau.
123: \newblock Practical scheme to share a secret key through a quantum channel with
124: a $27.6\%$ bit error rate.
125: \newblock {\em Phys.\ Rev.\ A}, 66:060302, 2002.
126:
127: \bibitem[CRE04]{ChReEk04}
128: M.~Christandl, R.~Renner, and A.~Ekert.
129: \newblock A generic security proof for quantum key distribution.
130: \newblock \url{http://arxiv.org/abs/quant-ph/0402131}, February 2004.
131:
132: \bibitem[CT91]{CovTho91}
133: T.~M. Cover and J.~A. Thomas.
134: \newblock {\em Elements of Information Theory}.
135: \newblock Wiley Series in Telecommunications. Wiley, New York, 1991.
136:
137: \bibitem[CW79]{CarWeg79}
138: J.~L. Carter and M.~N. Wegman.
139: \newblock Universal classes of hash functions.
140: \newblock {\em Journal of Computer and System Sciences}, 18:143--154, 1979.
141:
142: \bibitem[DFSS05]{DFSS05}
143: I.~Damgaard, S.~Fehr, L.~Salvail, and C.~Schaffner.
144: \newblock Cryptography in the bounded quantum-storage model.
145: \newblock In {\em 46th Annual Symposium on Foundations of Computer Science
146: (FOCS)}, pages 449--458, 2005.
147:
148: \bibitem[DHL{\etalchar{+}}04]{DHLST04}
149: D.~P. DiVincenzo, M.~Horodecki, D.~W. Leung, J.~A. Smolin, and B.~M. Terhal.
150: \newblock Locking classical correlation in quantum states.
151: \newblock {\em Phys.\ Rev.\ Lett.}, 92:067902, 2004.
152:
153: \bibitem[DM04]{DziMau04}
154: S.~Dziembowski and U.~Maurer.
155: \newblock Optimal randomizer efficiency in the bounded-storage model.
156: \newblock {\em Journal of Cryptology}, 17(1):5--26, 2004.
157: \newblock Conference version appeared in Proc. of \mbox{STOC '02}.
158:
159: \bibitem[Dum98]{Dumer98}
160: Ilya~I. Dumer.
161: \newblock Concatenated codes and their multilevel generalizations.
162: \newblock In Vera~Saine Pless and W.~C. Huffman, editors, {\em The Handbook of
163: Coding Theory}, volume~2, chapter~23, pages 1191--1988. North-Holland,
164: Elsevier, 1998.
165:
166: \bibitem[DW05]{DevWin05}
167: I.~Devetak and A.~Winter.
168: \newblock Distillation of secret key and entanglement from quantum states.
169: \newblock {\em Proc.\ R.\ Soc.\ Lond. A}, 461:207--235, 2005.
170:
171: \bibitem[Eke91]{Ekert91}
172: A.~K. Ekert.
173: \newblock Quantum cryptography based on {Bell's} theorem.
174: \newblock {\em Phys.\ Rev.\ Lett.}, 67:661, 1991.
175:
176: \bibitem[GL03]{GotLo03}
177: D.~Gottesman and H.-K. Lo.
178: \newblock Proof of security of quantum key distribution with two-way classical
179: communications.
180: \newblock {\em IEEE Transactions on Information Theory}, 49(2):457--475, 2003.
181:
182: \bibitem[GN93]{GemNao93}
183: P.~Gemmell and N.~Naor.
184: \newblock Codes for interactive authentication.
185: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '93}}, volume 773 of
186: {\em Lecture Notes in Computer Science}, pages 355--367. Springer, 1993.
187:
188: \bibitem[Gro05]{Grossha05}
189: F.~Grosshans.
190: \newblock Collective attacks and unconditional security in continuous variable
191: quantum key distribution.
192: \newblock {\em Phys.\ Rev.\ Lett}, 94:020504, 2005.
193:
194: \bibitem[HJ85]{HorJoh85}
195: R.~A. Horn and C.~R. Johnson.
196: \newblock {\em Matrix analysis}.
197: \newblock Cambridge University Press, 1985.
198:
199: \bibitem[HLSW04]{HLSW04}
200: P.~Hayden, D.~Leung, P.~W. Shor, and A.~Winter.
201: \newblock Randomizing quantum states: Constructions and applications.
202: \newblock {\em Communications in Mathematical Physics}, 250(2):371--391, 2004.
203:
204: \bibitem[HM76]{HudMoo76}
205: R.~L. Hudson and G.~R. Moody.
206: \newblock Locally normal symmetric states and an analogue of de {Finetti's}
207: theorem.
208: \newblock {\em Z.\ Wahrschein. verw. Geb.}, 33:343--351, 1976.
209:
210: \bibitem[HR05]{HolRen05}
211: T.~Holenstein and R.~Renner.
212: \newblock One-way secret-key agreement and applications to circuit polarization
213: and immunization of public-key encryption.
214: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '05}}, Lecture Notes
215: in Computer Science, pages 478--493. Springer, 2005.
216:
217: \bibitem[ILL89]{ImLeLu89}
218: R.~Impagliazzo, L.~A. Levin, and M.~Luby.
219: \newblock Pseudo-random generation from one-way functions (extended abstract).
220: \newblock In {\em Proceedings of the Twenty-First Annual ACM Symposium on
221: Theory of Computing}, pages 12--24, 1989.
222:
223: \bibitem[ILM01]{InLuMa01}
224: H.~Inamori, N.~L\"utkenhaus, and D.~Mayers.
225: \newblock Unconditional security for practial quantum key distribution.
226: \newblock \url{http://arxiv.org/abs/quant-ph/0107017}, July 2001.
227:
228: \bibitem[KGR05]{KrGiRe05}
229: B.~Kraus, N.~Gisin, and R.~Renner.
230: \newblock Lower and upper bounds on the secret key rate for {QKD} protocols
231: using one-way classical communication.
232: \newblock {\em Phys.\ Rev.\ Lett.}, 95:080501, 2005.
233:
234: \bibitem[KMR05]{KoMaRe05}
235: R.~K\"onig, U.~Maurer, and R.~Renner.
236: \newblock On the power of quantum memory.
237: \newblock {\em IEEE Transactions on Information Theory}, 51(7):2391--2401,
238: 2005.
239: \newblock A preliminary version appeared 2003 on the eprint archive
240: \url{http://arxiv.org/abs/quant-ph/0305154}.
241:
242: \bibitem[KR05]{KoeRen05}
243: R.~K\"onig and R.~Renner.
244: \newblock A de {Finetti} representation for finite symmetric quantum states.
245: \newblock {\em Journal of Mathematical Physics}, 46:122108, 2005.
246:
247: \bibitem[LC99]{LoCha99}
248: H.-K. Lo and H.~F. Chau.
249: \newblock Unconditional security of quantum key distribution over arbitrarily
250: long distances.
251: \newblock {\em Science}, 283:2050--2056, 1999.
252:
253: \bibitem[LCA05]{LoChAr05}
254: H.-K. Lo, H.~F. Chau, and M.~Ardehali.
255: \newblock Efficient quantum key distribution scheme and a proof of its
256: unconditional security.
257: \newblock {\em Journal of Cryptology}, 18(2):133--165, 2005.
258:
259: \bibitem[Lo00]{Lo00}
260: H.-K. Lo.
261: \newblock Proof of unconditional security of six-state quantum key distribution
262: scheme.
263: \newblock {\em Quantum Information and Computation}, 1(2):81, 2000.
264:
265: \bibitem[Lo05]{Lo05}
266: H.-K. Lo.
267: \newblock Getting something out of nothing.
268: \newblock \url{http://arxiv.org/abs/quant-ph/0503004}, March 2005.
269:
270: \bibitem[Mau93]{Maurer93}
271: U.~M. Maurer.
272: \newblock Secret key agreement by public discussion from common information.
273: \newblock {\em IEEE Transactions on Information Theory}, 39(3):733--742, 1993.
274:
275: \bibitem[May96]{Mayers96}
276: D.~Mayers.
277: \newblock Quantum key distribution and string oblivious transfer in noisy
278: channels.
279: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '96}}, volume 1109 of
280: {\em Lecture Notes in Computer Science}, pages 343--357. Springer, 1996.
281:
282: \bibitem[May01]{Mayers01}
283: D.~Mayers.
284: \newblock Unconditional security in quantum cryptography.
285: \newblock {\em Journal of the ACM}, 48(3):351--406, 2001.
286:
287: \bibitem[MC93]{deFine93}
288: P.~Monari and D.~Cocchi, editors.
289: \newblock {\em Introduction to {Bruno} de {Finetti}'s ``Probabili\'a e
290: Induzione''}.
291: \newblock Cooperativa Libraria Universitaria Editrice, Bologna, 1993.
292:
293: \bibitem[MRH04]{MaReHo04}
294: U.~Maurer, R.~Renner, and C.~Holenstein.
295: \newblock Indifferentiability, impossibility results on reductions, and
296: applications to the random oracle methodology.
297: \newblock In {\em First Theory of Cryptography Conference {TCC}}, volume 2951
298: of {\em Lecture Notes in Computer Science}, pages 21--39. Springer, 2004.
299:
300: \bibitem[NA05]{NavAci05}
301: M.~Navascu\'es and A.~Ac\'in.
302: \newblock Security bounds for continuous variables quantum key distribution.
303: \newblock {\em Phys.\ Rev.\ Lett.}, 94:020505, 2005.
304:
305: \bibitem[NC00]{NieChu00}
306: M.~A. Nielsen and I.~L. Chuang.
307: \newblock {\em Quantum computation and quantum information}.
308: \newblock Cambridge University Press, 2000.
309:
310: \bibitem[PW00]{PfiWai00a}
311: B.~Pfitzmann and M.~Waidner.
312: \newblock Composition and integrity preservation of secure reactive systems.
313: \newblock In {\em 7th ACM Conference on Computer and Communications Security},
314: pages 245--254. ACM Press, 2000.
315:
316: \bibitem[RGK05]{ReGiKr05}
317: R.~Renner, N.~Gisin, and B.~Kraus.
318: \newblock Information-theoretic security proof for quantum key distribution
319: protocols.
320: \newblock {\em Phys.\ Rev.\ A}, 72:012332, 2005.
321:
322: \bibitem[RK05]{RenKoe05}
323: R.~Renner and R.~K\"onig.
324: \newblock Universally composable privacy amplification against quantum
325: adversaries.
326: \newblock In {\em Second Theory of Cryptography Conference {TCC}}, volume 3378
327: of {\em Lecture Notes in Computer Science}, pages 407--425. Springer, 2005.
328: \newblock Also available at \url{http://arxiv.org/abs/quant-ph/0403133}.
329:
330: \bibitem[RW03]{RenWol03c}
331: R.~Renner and S.~Wolf.
332: \newblock Unconditional authenticity and privacy from an arbitrarily weak
333: secret.
334: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '03}}, Lecture Notes
335: in Computer Science, pages 78--95. Springer, 2003.
336:
337: \bibitem[RW04]{RenWol04}
338: R.~Renner and S.~Wolf.
339: \newblock The exact price for unconditionally secure asymmetric cryptography.
340: \newblock In {\em Advances in Cryptology --- \mbox{EUROCRYPT '04}}, Lecture
341: Notes in Computer Science, pages 109--125. Springer, 2004.
342:
343: \bibitem[SARG04]{SARG04}
344: V.~Scarani, A.~Acin, G.~Ribordy, and N.~Gisin.
345: \newblock Quantum cryptography protocols robust against photon number splitting
346: attacks for weak laser pulse implementations.
347: \newblock {\em Phys.\ Rev.\ Lett.}, 92:057901, 2004.
348:
349: \bibitem[Sha49]{Shanno49}
350: Claude~E. Shannon.
351: \newblock Communication theory of secrecy systems.
352: \newblock {\em Bell Systems Technical Journal}, 28:656--715, 1949.
353:
354: \bibitem[SP00]{ShoPre00}
355: P.~Shor and J.~Preskill.
356: \newblock Simple proof of security of the {BB84} quantum key distribution
357: protocol.
358: \newblock {\em Phys.\ Rev.\ Lett.}, 85:441, 2000.
359:
360: \bibitem[Sti91]{Stinso91}
361: D.~R. Stinson.
362: \newblock Universal hashing and authentication codes.
363: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '91}}, volume 576 of
364: {\em Lecture Notes in Computer Science}, pages 74--85, 1991.
365:
366: \bibitem[TKI03]{TaKoIm03}
367: K.~Tamaki, M.~Koashi, and N.~Imoto.
368: \newblock Unconditionally secure key distribution based on two nonorthogonal
369: states.
370: \newblock {\em Phys.\ Rev.\ Lett.}, 90:167904, 2003.
371:
372: \bibitem[Unr04]{Unruh04}
373: D.~Unruh.
374: \newblock Simulatable security for quantum protocols.
375: \newblock \url{http://arxiv.org/abs/quant-ph/0409125}, September 2004.
376:
377: \bibitem[Ver26]{Vernam26}
378: G.~S. Vernam.
379: \newblock Cipher printing telegraph systems for secret wire and radio
380: telegraphic communications.
381: \newblock {\em J. Am. Inst. Elec. Eng.}, 55:109--115, 1926.
382:
383: \bibitem[WC81]{WegCar81}
384: M.~N. Wegman and J.~L. Carter.
385: \newblock New hash functions and their use in authentication and set equality.
386: \newblock {\em Journal of Computer and System Sciences}, 22:265--279, 1981.
387:
388: \bibitem[WG00]{WalGoo00}
389: N.~R. Wallach and R.~Goodman.
390: \newblock {\em Representations and Invariants of the Classical Groups}.
391: \newblock Cambridge University Press, 2000.
392:
393: \bibitem[Wie83]{Wiesner83}
394: S.~Wiesner.
395: \newblock Conjugate coding.
396: \newblock {\em Sigact News}, 15(1):78--88, 1983.
397:
398: \bibitem[Win99]{Winter99}
399: A.~Winter.
400: \newblock Coding theorem and strong converse for quantum channels.
401: \newblock {\em IEEE Transactions on Information Theory}, 45(7), 1999.
402:
403: \end{thebibliography}
404: