{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T14:57:20Z","timestamp":1766847440901},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540281146"},{"type":"electronic","value":"9783540318705"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11535218_30","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T18:20:34Z","timestamp":1292869234000},"page":"494-510","source":"Crossref","is-referenced-by-count":14,"title":["A Quantum Cipher with Near Optimal Key-Recycling"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Damg\u00e5rd","sequence":"first","affiliation":[]},{"given":"Thomas Brochmann","family":"Pedersen","sequence":"additional","affiliation":[]},{"given":"Louis","family":"Salvail","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Mosca, M., Tapp, A., de Wolf, R.: Private quantum channels. In: Proceedings of the 41st IEEE Symposium on Foundations of Computer Science \u2014 FOCS 2000, pp. 547\u2013553 (2000)","DOI":"10.1109\/SFCS.2000.892142"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: Proc. 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS 2002), pp. 449\u2013458 (2002)","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-540-30576-7_21","volume-title":"Theory of Cryptography","author":"M. Ben-Or","year":"2005","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 386\u2013406. Springer, Heidelberg (2005)"},{"key":"30_CR4","unstructured":"Bennett, C.H., Brassard, G., Breidbart, S.: Quantum cryptography II: How to re-use a one-time pad safely even if P = NP (1982) (unpublished manuscript)"},{"key":"30_CR5","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0653-8","volume-title":"Matrix Analysis","author":"R. Bhatia","year":"1997","unstructured":"Bhatia, R.: Matrix Analysis. Graduate Texts in Mathematics. Springer, Heidelberg (1997)"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/800105.803400","volume-title":"Proceedings of the 9th ACM Symposium on Theory of Computing \u2014 STOC 1977","author":"J.L. Carter","year":"1977","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: Proceedings of the 9th ACM Symposium on Theory of Computing \u2014 STOC 1977, pp. 106\u2013112. ACM Press, New York (1977)"},{"issue":"3","key":"30_CR7","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R. Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Physical Review Letter\u00a083(3), 648\u2013651 (1999)","journal-title":"Physical Review Letter"},{"key":"30_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-540-24676-3_6","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"I.B. Damg\u00e5rd","year":"2004","unstructured":"Damg\u00e5rd, I.B., Pedersen, T.B., Salvail, L.: On the key-uncertainty of quantum ciphers and the computational security of one-way quantum transmission. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 91\u2013108. Springer, Heidelberg (2004)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.B., Pedersen, T.B., Salvail, L.: A quantum cipher with near optimal key-recycling. rs RS-05-17, BRICS, Department of Computer Science, University of Aarhus, Ny Munkegade, DK-8000 Aarhus C, Denmark (2005)","DOI":"10.7146\/brics.v12i17.21883"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-24676-3_8","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"S. Dziembowski","year":"2004","unstructured":"Dziembowski, S., Maurer, U.M.: On generating the initial key in the bounded-storage model. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 126\u2013137. Springer, Heidelberg (2004)"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Lawrence, J., Brukner, \u010c., Zeilinger, A.: Mutually unbiased binary observable sets on N qubits. Physical Review A\u00a065(3) (2002)","DOI":"10.1103\/PhysRevA.65.032320"},{"issue":"1","key":"30_CR12","doi-asserted-by":"crossref","first-page":"14","DOI":"10.26421\/QIC2.1-2","volume":"2","author":"D.W. Leung","year":"2002","unstructured":"Leung, D.W.: Quantum vernam cipher. Quantum Information and Computation\u00a02(1), 14\u201334 (2002)","journal-title":"Quantum Information and Computation"},{"issue":"1","key":"30_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s00145-003-0217-1","volume":"17","author":"C.-J. Lu","year":"2004","unstructured":"Lu, C.-J.: Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology\u00a017(1), 27\u201342 (2004)","journal-title":"Journal of Cryptology"},{"key":"30_CR14","unstructured":"Nielsen, J.B.: Private communication (2005)"},{"key":"30_CR15","volume-title":"Quantum Computation and Quantum Information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"30_CR16","unstructured":"Oppenheim, J., Horodecki, M.: How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information, Available at http:\/\/arxiv.org\/abs\/quant-ph\/0306161"},{"key":"30_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-30576-7_22","volume-title":"Theory of Cryptography","author":"R. Renner","year":"2005","unstructured":"Renner, R., K\u00f6nig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 407\u2013425. Springer, Heidelberg (2005)"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters\u00a085, 441\u2013444 (2000)","journal-title":"Physical Review Letters"},{"issue":"1","key":"30_CR19","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s00145-003-0237-x","volume":"17","author":"S.P. Vadhan","year":"2004","unstructured":"Vadhan, S.P.: On constructing locally computable extractors and cryptosystems in the bounded storage model. Journal of Cryptology\u00a017(1), 43\u201377 (2004)","journal-title":"Journal of Cryptology"},{"issue":"2","key":"30_CR20","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/0003-4916(89)90322-9","volume":"191","author":"W.K. Wootters","year":"1989","unstructured":"Wootters, W.K., Fields, B.D.: Optimal state-determination by mutually unbiased measurements. Annals of Physics\u00a0191(2), 363\u2013381 (1989)","journal-title":"Annals of Physics"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11535218_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T23:54:12Z","timestamp":1637020452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11535218_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281146","9783540318705"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11535218_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}