quant-ph0512258/main.bbl
1: \newcommand{\etalchar}[1]{$^{#1}$}
2: \begin{thebibliography}{BOHL{\etalchar{+}}05}
3: 
4: \bibitem[ABB{\etalchar{+}}04]{ABBBMMT04}
5: A.~Ac\'in, J.~Bae, E.~Bagan, M.~Baig, Ll. Masanes, and R.~{Mu\~{n}oz}-Tapia.
6: \newblock Secrecy content of two-qubit states.
7: \newblock \url{http://arxiv.org/abs/quant-ph/0411092}, November 2004.
8: 
9: \bibitem[Bar05]{Bariska05}
10: A.~Bariska.
11: \newblock On a weakness of common security definitions for {QKD} protocols.
12: \newblock Master's thesis, ETH Z\"urich, March 2005.
13: \newblock See also \url{http://arxiv.org/abs/quant-ph/0512021}.
14: 
15: \bibitem[BB84]{BenBra84}
16: C.~H. Bennett and G.~Brassard.
17: \newblock Quantum cryptography: Public-key distribution and coin tossing.
18: \newblock In {\em Proceedings of IEEE International Conference on Computers,
19:   Systems and Signal Processing}, pages 175--179, 1984.
20: 
21: \bibitem[BBB{\etalchar{+}}02]{BBBGM02}
22: E.~Biham, M.~Boyer, G.~Brassard, J.~van~de Graaf, and T.~Mor.
23: \newblock Security of quantum key distribution against all collective attacks.
24: \newblock {\em Algorithmica}, 34:372--388, 2002.
25: 
26: \bibitem[BBB{\etalchar{+}}05]{BBBMR05}
27: E.~Biham, M.~Boyer, P.~O. Boykin, T.~Mor, and V.~Roychowdhury.
28: \newblock A proof of the security of quantum key distribution.
29: \newblock {\em Journal of Cryptology}, 2005.
30: \newblock to appear.
31: 
32: \bibitem[BBCM95]{BBCM95}
33: C.~H. Bennett, G.~Brassard, C.~Cr{\'e}peau, and U.~Maurer.
34: \newblock Generalized privacy amplification.
35: \newblock {\em IEEE Transaction on Information Theory}, 41(6):1915--1923, 1995.
36: 
37: \bibitem[BBM92]{BeBrMe92}
38: C.~H. Bennett, G.~Brassard, and N.~D. Mermin.
39: \newblock Quantum cryptography without {Bell's} theorem.
40: \newblock {\em Phys.\ Rev.\ Lett.}, 68:557--559, 1992.
41: 
42: \bibitem[BBP{\etalchar{+}}96]{BBPSSW96}
43: C.~H. Bennett, G.~Brassard, S.~Popescu, B.~Schumacherand~J. Smolin, and
44:   W.~Wootters.
45: \newblock Purification of noisy entanglement and faithful teleportation via
46:   noisy channels.
47: \newblock {\em Phys.\ Rev.\ Lett.}, 76:722--726, 1996.
48: 
49: \bibitem[BBR88]{BeBrRo88}
50: C.~H. Bennett, G.~Brassard, and J.-M. Robert.
51: \newblock Privacy amplification by public discussion.
52: \newblock {\em SIAM Journal on Computing}, 17(2):210--229, 1988.
53: 
54: \bibitem[Ben92]{Bennet92}
55: C.~H. Bennett.
56: \newblock Quantum cryptography using any two nonorthogonal states.
57: \newblock {\em Phys.\ Rev.\ Lett.}, 68(21):3121--3124, 1992.
58: 
59: \bibitem[Bir46]{Birkho46}
60: G.~Birkhoff.
61: \newblock Three observations on linear algebra.
62: \newblock {\em Univ.\ Nac.\ Tucum\'an. Rev. Ser. A}, 5:147--151, 1946.
63: 
64: \bibitem[BM97a]{BihMor97b}
65: E.~Biham and T.~Mor.
66: \newblock Bounds on information and the security of quantum cryptography,.
67: \newblock {\em Phys.\ Rev.\ Lett.}, 79:4034--4037, 1997.
68: 
69: \bibitem[BM97b]{BihMor97a}
70: E.~Biham and T.~Mor.
71: \newblock Security of quantum cryptography against collective attacks.
72: \newblock {\em Phys.\ Rev.\ Lett.}, 78(11):2256--2259, 1997.
73: 
74: \bibitem[BMS96]{BeMoSm96}
75: C.~H. Bennett, T.~Mor, and J.~A. Smolin.
76: \newblock The parity bit in quantum cryptography.
77: \newblock {\em Phys.\ Rev.\ A}, 54:2675--2684, 1996.
78: 
79: \bibitem[BOHL{\etalchar{+}}05]{BHLMO05}
80: M.~Ben-Or, M.~Horodecki, D.~W. Leung, D.~Mayers, and J.~Oppenheim.
81: \newblock The universal composable security of quantum key distribution.
82: \newblock In {\em Second Theory of Cryptography Conference {TCC}}, volume 3378
83:   of {\em Lecture Notes in Computer Science}, pages 386--406. Springer, 2005.
84: \newblock Also available at \url{http://arxiv.org/abs/quant-ph/0409078}.
85: 
86: \bibitem[BOM04]{BenMay04}
87: M.~Ben-Or and D.~Mayers.
88: \newblock General security definition and composability for quantum and
89:   classical protocols.
90: \newblock \url{http://arxiv.org/abs/quant-ph/0409062}, September 2004.
91: 
92: \bibitem[BPG99]{BecGis99}
93: H.~Bechmann-Pasquinucci and N.~Gisin.
94: \newblock Incoherent and coherent eavesdropping in the six-state protocol of
95:   quantum cryptography.
96: \newblock {\em Phys.\ Rev.\ A,}, 59:4238, 1999.
97: 
98: \bibitem[Bru98]{Bruss98}
99: D.~Bruss.
100: \newblock Optimal eavesdropping in quantum cryptography with six states.
101: \newblock {\em Phys.\ Rev.\ Lett.}, 81:3018, 1998.
102: 
103: \bibitem[BS94]{BraSal94}
104: G.~Brassard and L.~Salvail.
105: \newblock Secret-key reconciliation by public discussion.
106: \newblock In {\em Advances of Cryptology --- \mbox{EUROCRYPT '93}}, Lecture
107:   Notes in Computer Science, pages 410--423. Springer, 1994.
108: 
109: \bibitem[Can01]{Canetti01}
110: R.~Canetti.
111: \newblock Universally composable security: A new paradigm for cryptographic
112:   protocols.
113: \newblock In {\em Proc.\ 42nd IEEE Symposium on Foundations of Computer Science
114:   (FOCS)}, pages 136--145, 2001.
115: 
116: \bibitem[CFS02]{CaFuSh02}
117: C.~M. Caves, C.~A. Fuchs, and R.~Schack.
118: \newblock Unknown quantum states: The quantum de {Finetti} representation.
119: \newblock {\em Journal of Mathematical Physics}, page 4537, 2002.
120: 
121: \bibitem[Cha02]{Chau02}
122: H.~F.\ Chau.
123: \newblock Practical scheme to share a secret key through a quantum channel with
124:   a $27.6\%$ bit error rate.
125: \newblock {\em Phys.\ Rev.\ A}, 66:060302, 2002.
126: 
127: \bibitem[CRE04]{ChReEk04}
128: M.~Christandl, R.~Renner, and A.~Ekert.
129: \newblock A generic security proof for quantum key distribution.
130: \newblock \url{http://arxiv.org/abs/quant-ph/0402131}, February 2004.
131: 
132: \bibitem[CT91]{CovTho91}
133: T.~M. Cover and J.~A. Thomas.
134: \newblock {\em Elements of Information Theory}.
135: \newblock Wiley Series in Telecommunications. Wiley, New York, 1991.
136: 
137: \bibitem[CW79]{CarWeg79}
138: J.~L. Carter and M.~N. Wegman.
139: \newblock Universal classes of hash functions.
140: \newblock {\em Journal of Computer and System Sciences}, 18:143--154, 1979.
141: 
142: \bibitem[DFSS05]{DFSS05}
143: I.~Damgaard, S.~Fehr, L.~Salvail, and C.~Schaffner.
144: \newblock Cryptography in the bounded quantum-storage model.
145: \newblock In {\em 46th Annual Symposium on Foundations of Computer Science
146:   (FOCS)}, pages 449--458, 2005.
147: 
148: \bibitem[DHL{\etalchar{+}}04]{DHLST04}
149: D.~P. DiVincenzo, M.~Horodecki, D.~W. Leung, J.~A. Smolin, and B.~M. Terhal.
150: \newblock Locking classical correlation in quantum states.
151: \newblock {\em Phys.\ Rev.\ Lett.}, 92:067902, 2004.
152: 
153: \bibitem[DM04]{DziMau04}
154: S.~Dziembowski and U.~Maurer.
155: \newblock Optimal randomizer efficiency in the bounded-storage model.
156: \newblock {\em Journal of Cryptology}, 17(1):5--26, 2004.
157: \newblock Conference version appeared in Proc. of \mbox{STOC '02}.
158: 
159: \bibitem[Dum98]{Dumer98}
160: Ilya~I. Dumer.
161: \newblock Concatenated codes and their multilevel generalizations.
162: \newblock In Vera~Saine Pless and W.~C. Huffman, editors, {\em The Handbook of
163:   Coding Theory}, volume~2, chapter~23, pages 1191--1988. North-Holland,
164:   Elsevier, 1998.
165: 
166: \bibitem[DW05]{DevWin05}
167: I.~Devetak and A.~Winter.
168: \newblock Distillation of secret key and entanglement from quantum states.
169: \newblock {\em Proc.\ R.\ Soc.\ Lond. A}, 461:207--235, 2005.
170: 
171: \bibitem[Eke91]{Ekert91}
172: A.~K. Ekert.
173: \newblock Quantum cryptography based on {Bell's} theorem.
174: \newblock {\em Phys.\ Rev.\ Lett.}, 67:661, 1991.
175: 
176: \bibitem[GL03]{GotLo03}
177: D.~Gottesman and H.-K. Lo.
178: \newblock Proof of security of quantum key distribution with two-way classical
179:   communications.
180: \newblock {\em IEEE Transactions on Information Theory}, 49(2):457--475, 2003.
181: 
182: \bibitem[GN93]{GemNao93}
183: P.~Gemmell and N.~Naor.
184: \newblock Codes for interactive authentication.
185: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '93}}, volume 773 of
186:   {\em Lecture Notes in Computer Science}, pages 355--367. Springer, 1993.
187: 
188: \bibitem[Gro05]{Grossha05}
189: F.~Grosshans.
190: \newblock Collective attacks and unconditional security in continuous variable
191:   quantum key distribution.
192: \newblock {\em Phys.\ Rev.\ Lett}, 94:020504, 2005.
193: 
194: \bibitem[HJ85]{HorJoh85}
195: R.~A. Horn and C.~R. Johnson.
196: \newblock {\em Matrix analysis}.
197: \newblock Cambridge University Press, 1985.
198: 
199: \bibitem[HLSW04]{HLSW04}
200: P.~Hayden, D.~Leung, P.~W. Shor, and A.~Winter.
201: \newblock Randomizing quantum states: Constructions and applications.
202: \newblock {\em Communications in Mathematical Physics}, 250(2):371--391, 2004.
203: 
204: \bibitem[HM76]{HudMoo76}
205: R.~L. Hudson and G.~R. Moody.
206: \newblock Locally normal symmetric states and an analogue of de {Finetti's}
207:   theorem.
208: \newblock {\em Z.\ Wahrschein. verw. Geb.}, 33:343--351, 1976.
209: 
210: \bibitem[HR05]{HolRen05}
211: T.~Holenstein and R.~Renner.
212: \newblock One-way secret-key agreement and applications to circuit polarization
213:   and immunization of public-key encryption.
214: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '05}}, Lecture Notes
215:   in Computer Science, pages 478--493. Springer, 2005.
216: 
217: \bibitem[ILL89]{ImLeLu89}
218: R.~Impagliazzo, L.~A. Levin, and M.~Luby.
219: \newblock Pseudo-random generation from one-way functions (extended abstract).
220: \newblock In {\em Proceedings of the Twenty-First Annual ACM Symposium on
221:   Theory of Computing}, pages 12--24, 1989.
222: 
223: \bibitem[ILM01]{InLuMa01}
224: H.~Inamori, N.~L\"utkenhaus, and D.~Mayers.
225: \newblock Unconditional security for practial quantum key distribution.
226: \newblock \url{http://arxiv.org/abs/quant-ph/0107017}, July 2001.
227: 
228: \bibitem[KGR05]{KrGiRe05}
229: B.~Kraus, N.~Gisin, and R.~Renner.
230: \newblock Lower and upper bounds on the secret key rate for {QKD} protocols
231:   using one-way classical communication.
232: \newblock {\em Phys.\ Rev.\ Lett.}, 95:080501, 2005.
233: 
234: \bibitem[KMR05]{KoMaRe05}
235: R.~K\"onig, U.~Maurer, and R.~Renner.
236: \newblock On the power of quantum memory.
237: \newblock {\em IEEE Transactions on Information Theory}, 51(7):2391--2401,
238:   2005.
239: \newblock A preliminary version appeared 2003 on the eprint archive
240:   \url{http://arxiv.org/abs/quant-ph/0305154}.
241: 
242: \bibitem[KR05]{KoeRen05}
243: R.~K\"onig and R.~Renner.
244: \newblock A de {Finetti} representation for finite symmetric quantum states.
245: \newblock {\em Journal of Mathematical Physics}, 46:122108, 2005.
246: 
247: \bibitem[LC99]{LoCha99}
248: H.-K. Lo and H.~F. Chau.
249: \newblock Unconditional security of quantum key distribution over arbitrarily
250:   long distances.
251: \newblock {\em Science}, 283:2050--2056, 1999.
252: 
253: \bibitem[LCA05]{LoChAr05}
254: H.-K. Lo, H.~F. Chau, and M.~Ardehali.
255: \newblock Efficient quantum key distribution scheme and a proof of its
256:   unconditional security.
257: \newblock {\em Journal of Cryptology}, 18(2):133--165, 2005.
258: 
259: \bibitem[Lo00]{Lo00}
260: H.-K. Lo.
261: \newblock Proof of unconditional security of six-state quantum key distribution
262:   scheme.
263: \newblock {\em Quantum Information and Computation}, 1(2):81, 2000.
264: 
265: \bibitem[Lo05]{Lo05}
266: H.-K. Lo.
267: \newblock Getting something out of nothing.
268: \newblock \url{http://arxiv.org/abs/quant-ph/0503004}, March 2005.
269: 
270: \bibitem[Mau93]{Maurer93}
271: U.~M. Maurer.
272: \newblock Secret key agreement by public discussion from common information.
273: \newblock {\em IEEE Transactions on Information Theory}, 39(3):733--742, 1993.
274: 
275: \bibitem[May96]{Mayers96}
276: D.~Mayers.
277: \newblock Quantum key distribution and string oblivious transfer in noisy
278:   channels.
279: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '96}}, volume 1109 of
280:   {\em Lecture Notes in Computer Science}, pages 343--357. Springer, 1996.
281: 
282: \bibitem[May01]{Mayers01}
283: D.~Mayers.
284: \newblock Unconditional security in quantum cryptography.
285: \newblock {\em Journal of the ACM}, 48(3):351--406, 2001.
286: 
287: \bibitem[MC93]{deFine93}
288: P.~Monari and D.~Cocchi, editors.
289: \newblock {\em Introduction to {Bruno} de {Finetti}'s ``Probabili\'a e
290:   Induzione''}.
291: \newblock Cooperativa Libraria Universitaria Editrice, Bologna, 1993.
292: 
293: \bibitem[MRH04]{MaReHo04}
294: U.~Maurer, R.~Renner, and C.~Holenstein.
295: \newblock Indifferentiability, impossibility results on reductions, and
296:   applications to the random oracle methodology.
297: \newblock In {\em First Theory of Cryptography Conference {TCC}}, volume 2951
298:   of {\em Lecture Notes in Computer Science}, pages 21--39. Springer, 2004.
299: 
300: \bibitem[NA05]{NavAci05}
301: M.~Navascu\'es and A.~Ac\'in.
302: \newblock Security bounds for continuous variables quantum key distribution.
303: \newblock {\em Phys.\ Rev.\ Lett.}, 94:020505, 2005.
304: 
305: \bibitem[NC00]{NieChu00}
306: M.~A. Nielsen and I.~L. Chuang.
307: \newblock {\em Quantum computation and quantum information}.
308: \newblock Cambridge University Press, 2000.
309: 
310: \bibitem[PW00]{PfiWai00a}
311: B.~Pfitzmann and M.~Waidner.
312: \newblock Composition and integrity preservation of secure reactive systems.
313: \newblock In {\em 7th ACM Conference on Computer and Communications Security},
314:   pages 245--254. ACM Press, 2000.
315: 
316: \bibitem[RGK05]{ReGiKr05}
317: R.~Renner, N.~Gisin, and B.~Kraus.
318: \newblock Information-theoretic security proof for quantum key distribution
319:   protocols.
320: \newblock {\em Phys.\ Rev.\ A}, 72:012332, 2005.
321: 
322: \bibitem[RK05]{RenKoe05}
323: R.~Renner and R.~K\"onig.
324: \newblock Universally composable privacy amplification against quantum
325:   adversaries.
326: \newblock In {\em Second Theory of Cryptography Conference {TCC}}, volume 3378
327:   of {\em Lecture Notes in Computer Science}, pages 407--425. Springer, 2005.
328: \newblock Also available at \url{http://arxiv.org/abs/quant-ph/0403133}.
329: 
330: \bibitem[RW03]{RenWol03c}
331: R.~Renner and S.~Wolf.
332: \newblock Unconditional authenticity and privacy from an arbitrarily weak
333:   secret.
334: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '03}}, Lecture Notes
335:   in Computer Science, pages 78--95. Springer, 2003.
336: 
337: \bibitem[RW04]{RenWol04}
338: R.~Renner and S.~Wolf.
339: \newblock The exact price for unconditionally secure asymmetric cryptography.
340: \newblock In {\em Advances in Cryptology --- \mbox{EUROCRYPT '04}}, Lecture
341:   Notes in Computer Science, pages 109--125. Springer, 2004.
342: 
343: \bibitem[SARG04]{SARG04}
344: V.~Scarani, A.~Acin, G.~Ribordy, and N.~Gisin.
345: \newblock Quantum cryptography protocols robust against photon number splitting
346:   attacks for weak laser pulse implementations.
347: \newblock {\em Phys.\ Rev.\ Lett.}, 92:057901, 2004.
348: 
349: \bibitem[Sha49]{Shanno49}
350: Claude~E. Shannon.
351: \newblock Communication theory of secrecy systems.
352: \newblock {\em Bell Systems Technical Journal}, 28:656--715, 1949.
353: 
354: \bibitem[SP00]{ShoPre00}
355: P.~Shor and J.~Preskill.
356: \newblock Simple proof of security of the {BB84} quantum key distribution
357:   protocol.
358: \newblock {\em Phys.\ Rev.\ Lett.}, 85:441, 2000.
359: 
360: \bibitem[Sti91]{Stinso91}
361: D.~R. Stinson.
362: \newblock Universal hashing and authentication codes.
363: \newblock In {\em Advances in Cryptology --- \mbox{CRYPTO '91}}, volume 576 of
364:   {\em Lecture Notes in Computer Science}, pages 74--85, 1991.
365: 
366: \bibitem[TKI03]{TaKoIm03}
367: K.~Tamaki, M.~Koashi, and N.~Imoto.
368: \newblock Unconditionally secure key distribution based on two nonorthogonal
369:   states.
370: \newblock {\em Phys.\ Rev.\ Lett.}, 90:167904, 2003.
371: 
372: \bibitem[Unr04]{Unruh04}
373: D.~Unruh.
374: \newblock Simulatable security for quantum protocols.
375: \newblock \url{http://arxiv.org/abs/quant-ph/0409125}, September 2004.
376: 
377: \bibitem[Ver26]{Vernam26}
378: G.~S. Vernam.
379: \newblock Cipher printing telegraph systems for secret wire and radio
380:   telegraphic communications.
381: \newblock {\em J. Am. Inst. Elec. Eng.}, 55:109--115, 1926.
382: 
383: \bibitem[WC81]{WegCar81}
384: M.~N. Wegman and J.~L. Carter.
385: \newblock New hash functions and their use in authentication and set equality.
386: \newblock {\em Journal of Computer and System Sciences}, 22:265--279, 1981.
387: 
388: \bibitem[WG00]{WalGoo00}
389: N.~R. Wallach and R.~Goodman.
390: \newblock {\em Representations and Invariants of the Classical Groups}.
391: \newblock Cambridge University Press, 2000.
392: 
393: \bibitem[Wie83]{Wiesner83}
394: S.~Wiesner.
395: \newblock Conjugate coding.
396: \newblock {\em Sigact News}, 15(1):78--88, 1983.
397: 
398: \bibitem[Win99]{Winter99}
399: A.~Winter.
400: \newblock Coding theorem and strong converse for quantum channels.
401: \newblock {\em IEEE Transactions on Information Theory}, 45(7), 1999.
402: 
403: \end{thebibliography}
404: