{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:08:25Z","timestamp":1773248905395,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030036379","type":"print"},{"value":"9783030036386","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03638-6_7","type":"book-chapter","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T07:12:53Z","timestamp":1541056373000},"page":"104-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Revisiting Deniability in Quantum Key Exchange"],"prefix":"10.1007","author":[{"given":"Arash","family":"Atashpendar","sequence":"first","affiliation":[]},{"given":"G. Vamsi","family":"Policharla","sequence":"additional","affiliation":[]},{"given":"Peter B.","family":"R\u00f8nne","sequence":"additional","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"issue":"25","key":"7_CR1","doi-asserted-by":"publisher","first-page":"250503","DOI":"10.1103\/PhysRevLett.117.250503","volume":"117","author":"JM Arrazola","year":"2016","unstructured":"Arrazola, J.M., Scarani, V.: Covert quantum communication. Phys. Rev. Lett. 117(25), 250503 (2016)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"7_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2015.7355562","volume":"53","author":"BA Bash","year":"2015","unstructured":"Bash, B.A., Goeckel, D., Towsley, D., Guha, S.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26\u201331 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/3-540-46035-7_23","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"D Beaver","year":"2002","unstructured":"Beaver, D.: On deniability in quantum key exchange. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 352\u2013367. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7_23"},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1103\/PhysRevA.53.2046","volume":"53","author":"Charles H. Bennett","year":"1996","unstructured":"Bennett, C.H., Bernstein, H.J., Popescu, S., Schumacher, B.: Concentrating partial entanglement by local operations. Phys. Rev. A 53(4), 2046 (1996)","journal-title":"Physical Review A"},{"key":"7_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175\u2013179 (1984)"},{"issue":"13","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"Charles H. Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)","journal-title":"Physical Review Letters"},{"issue":"5","key":"7_CR7","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1103\/PhysRevLett.76.722","volume":"76","author":"Charles H. Bennett","year":"1996","unstructured":"Bennett, C.H., Brassard, G., Popescu, S., Schumacher, B., Smolin, J.A., Wootters, W.K.: Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett. 76(5), 722 (1996)","journal-title":"Physical Review Letters"},{"issue":"5","key":"7_CR8","doi-asserted-by":"publisher","first-page":"3824","DOI":"10.1103\/PhysRevA.54.3824","volume":"54","author":"Charles H. Bennett","year":"1996","unstructured":"Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54(5), 3824 (1996)","journal-title":"Physical Review A"},{"issue":"10","key":"7_CR9","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1063\/1.3483717","volume":"51","author":"F Buscemi","year":"2010","unstructured":"Buscemi, F., Datta, N.: Distilling entanglement from arbitrary resources. J. Math. Phys. 51(10), 102\u2013201 (2010)","journal-title":"J. Math. Phys."},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1103\/PhysRevA.54.1098","volume":"54","author":"A. R. Calderbank","year":"1996","unstructured":"Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54(2), 1098 (1996)","journal-title":"Physical Review A"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0052229","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"R Canetti","year":"1997","unstructured":"Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90\u2013104. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052229"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/11593447_12","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"M Christandl","year":"2005","unstructured":"Christandl, M., Wehner, S.: Quantum anonymous transmissions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 217\u2013235. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11593447_12"},{"key":"7_CR13","unstructured":"Cremers, C., Feltz, M.: One-round strongly secure key exchange with perfect forward secrecy and deniability. Technical report, ETH Zurich (2011)"},{"issue":"2053","key":"7_CR14","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. 461(2053), 207\u2013235 (2005)","journal-title":"Proc. R. Soc. Lond. A Math. Phys. Eng. Sci."},{"issue":"4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/s00145-009-9044-3","volume":"22","author":"M Raimondo Di","year":"2009","unstructured":"Di Raimondo, M., Gennaro, R.: New approaches for deniable authentication. J. Cryptol. 22(4), 572\u2013615 (2009)","journal-title":"J. Cryptol."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Di Raimondo, M., Gennaro, R., Krawczyk, H.: Deniable authentication and key exchange. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 400\u2013409. ACM (2006)","DOI":"10.1145\/1180405.1180454"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-00457-5_10","volume-title":"Theory of Cryptography","author":"Yevgeniy Dodis","year":"2009","unstructured":"Dodis, Y., Katz, J., Smith, A., Walfish, S.: Composability and on-line deniability of authentication. In: Theory of Cryptography Conference, pp. 146\u2013162. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00457-5_10"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing, STOC 1998, pp. 409\u2013418. ACM, New York (1998)","DOI":"10.1145\/276698.276853"},{"issue":"6","key":"7_CR19","first-page":"581","volume":"3","author":"D Gottesman","year":"2003","unstructured":"Gottesman, D.: Uncloneable encryption. Quantum Inf. Comput. 3(6), 581\u2013602 (2003)","journal-title":"Quantum Inf. Comput."},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-25405-5_17","volume-title":"Post-Quantum Cryptography","author":"LM Ioannou","year":"2011","unstructured":"Ioannou, L.M., Mosca, M.: A new spin on quantum cryptography: avoiding trapdoors and embracing public keys. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 255\u2013274. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_17"},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"022309","DOI":"10.1103\/PhysRevA.69.022309","volume":"69","author":"M Koashi","year":"2004","unstructured":"Koashi, M., Winter, A.: Monogamy of quantum entanglement and other correlations. Phys. Rev. A 69(2), 022309 (2004)","journal-title":"Phys. Rev. A"},{"issue":"5410","key":"7_CR22","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H. Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"issue":"3","key":"7_CR23","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48(3), 351\u2013406 (2001)","journal-title":"J. ACM (JACM)"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-38616-9_9","volume-title":"Post-Quantum Cryptography","author":"M Mosca","year":"2013","unstructured":"Mosca, M., Stebila, D., Ustao\u011flu, B.: Quantum key distribution in the classical authenticated key exchange framework. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 136\u2013154. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38616-9_9"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Nielsen, M.A., Chuang, I.: Quantum Computation and Quantum Information (2002)","DOI":"10.1119\/1.1463744"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-540-45146-4_19","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"R Pass","year":"2003","unstructured":"Pass, R.: On deniability in the common reference string and random Oracle model. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 316\u2013337. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_19"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Sheikholeslami, A., Bash, B.A., Towsley, D., Goeckel, D., Guha, S.: Covert communication over classical-quantum channels. In: 2016 IEEE International Symposium on Information Theory (ISIT), pp. 2064\u20132068. IEEE (2016)","DOI":"10.1109\/ISIT.2016.7541662"},{"issue":"2","key":"7_CR28","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"1954","key":"7_CR29","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1098\/rspa.1996.0136","volume":"452","author":"A Steane","year":"1996","unstructured":"Steane, A.: Multiple-particle interference and quantum error correction. Proc. R. Soc. Lond. A 452(1954), 2551\u20132577 (1996)","journal-title":"Proc. R. Soc. Lond. A"},{"issue":"5","key":"7_CR30","doi-asserted-by":"publisher","first-page":"050503","DOI":"10.1103\/PhysRevLett.109.050503","volume":"109","author":"A Streltsov","year":"2012","unstructured":"Streltsov, A., Adesso, G., Piani, M., Bru\u00df, D.: Are general quantum correlations monogamous? Phys. Rev. Lett. 109(5), 050503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Unger, N., Goldberg, I.: Deniable key exchanges for secure messaging. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1211\u20131223. ACM (2015)","DOI":"10.1145\/2810103.2813616"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Wilde, M.M.: Quantum Information Theory. Cambridge University Press, New York (2013)","DOI":"10.1017\/CBO9781139525343"},{"issue":"5886","key":"7_CR33","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03638-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:46:39Z","timestamp":1662338799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03638-6_7"}},"subtitle":["via Covert Communication and Entanglement Distillation"],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030036379","9783030036386"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03638-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securitylab.no\/nordsec18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}