{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T01:25:31Z","timestamp":1775265931293,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030038090","type":"print"},{"value":"9783030038106","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03810-6_11","type":"book-chapter","created":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T16:30:29Z","timestamp":1541608229000},"page":"282-314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Dupuis","sequence":"first","affiliation":[]},{"given":"Serge","family":"Fehr","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Lamontagne","sequence":"additional","affiliation":[]},{"given":"Louis","family":"Salvail","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,8]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.985947","volume":"48","author":"R Ahlswede","year":"2002","unstructured":"Ahlswede, R., Winter, A.: Strong converse for identification via quantum channels. IEEE Trans. Inf. Theory 48(3), 569\u2013579 (2002)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Ambainis, A.: A new protocol and lower bounds for quantum coin flipping. In: Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing, STOC 2001, pp. 134\u2013142. ACM, New York (2001)","DOI":"10.1145\/380752.380788"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.jcss.2003.07.010","volume":"68","author":"A Ambainis","year":"2004","unstructured":"Ambainis, A.: A new protocol and lower bounds for quantum coin flipping. J. Comput. Syst. Sci. 68(2), 398\u2013416 (2004)","journal-title":"J. Comput. Syst. Sci."},{"issue":"16","key":"11_CR4","doi-asserted-by":"publisher","first-page":"160501","DOI":"10.1103\/PhysRevLett.98.160501","volume":"98","author":"MR Koenraad","year":"2007","unstructured":"Koenraad, M.R., et al.: Discriminating states: the quantum Chernoff bound. Phys. Rev. Lett. 98(16), 160501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"11_CR5","unstructured":"Blum, M.: Coin-flipping by telephone. In: Proceedings of CRYPTO 1991, pp. 11\u201315 (1981)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1007\/978-3-642-14623-7_39","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"NJ Bouman","year":"2010","unstructured":"Bouman, N.J., Fehr, S.: Sampling in a quantum population, and applications. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 724\u2013741. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_39"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Chailloux, A., Kerenidis, I.: Optimal quantum strong coin flipping. In: Proceedings of FOCS 2009, pp. 527\u2013533 (2009)","DOI":"10.1109\/FOCS.2009.71"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/s00220-007-0189-3","volume":"273","author":"M Christandl","year":"2007","unstructured":"Christandl, M., K\u00f6nig, R., Mitchison, G., Renner, R.: One-and-a-half quantum de Finetti theorems. Commun. Math. Phys. 273(2), 473\u2013498 (2007)","journal-title":"Commun. Math. Phys."},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.102.020504","volume":"102","author":"M Christandl","year":"2009","unstructured":"Christandl, M., K\u00f6nig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020504 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-17470-9_6","volume-title":"Information Theoretic Security","author":"I Damg\u00e5rd","year":"2015","unstructured":"Damg\u00e5rd, I., Dupuis, F., Nielsen, J.B.: On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation. In: Lehmann, A., Wolf, S. (eds.) ICITS 2015. LNCS, vol. 9063, pp. 87\u2013104. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17470-9_6"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-662-53015-3_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"F Dupuis","year":"2016","unstructured":"Dupuis, F., Fehr, S., Lamontagne, P., Salvail, L.: Adaptive versus non-adaptive strategies in the quantum setting with applications. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9816, pp. 33\u201359. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53015-3_2"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-36594-2_16","volume-title":"Theory of Cryptography","author":"S Fehr","year":"2013","unstructured":"Fehr, S., Katz, J., Song, F., Zhou, H.-S., Zikas, V.: Feasibility and completeness of cryptographic tasks in the quantum world. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 281\u2013296. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36594-2_16"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Gutoski, G., Watrous, J.: Toward a general theory of quantum games. In: Proceedings of STOC 2007, pp. 565\u2013574. ACM, New York (2007)","DOI":"10.1145\/1250790.1250873"},{"issue":"50","key":"11_CR14","doi-asserted-by":"publisher","first-page":"10759","DOI":"10.1088\/0305-4470\/35\/50\/307","volume":"35","author":"M Hayashi","year":"2002","unstructured":"Hayashi, M.: Optimal sequence of quantum measurements in the sense of Stein\u2019s lemma in quantum hypothesis testing. J. Phys. A Math. Gen. 35(50), 10759\u201310773 (2002)","journal-title":"J. Phys. A Math. Gen."},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/11761679_30","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"D Hofheinz","year":"2006","unstructured":"Hofheinz, D., M\u00fcller-Quade, J., Unruh, D.: On the (Im-)possibility of extending coin toss. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 504\u2013521. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_30"},{"issue":"333","key":"11_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.ipl.2003.07.007","volume":"89","author":"I Kerenidis","year":"2004","unstructured":"Kerenidis, I., Nayak, A.: Weak coin flipping with small bias. Inf. Process. Lett. 89(333), 131\u2013135 (2004)","journal-title":"Inf. Process. Lett."},{"key":"11_CR17","unstructured":"Kitaev, A.: Quantum coin-flipping. Presentation at the 6th Workshop on Quantum Information Processing (QIP 2003) (2003)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Mochon, C.: Quantum weak coin-flipping with bias of 0.192. In: Proceedings of FOCS 2004, pp. 2\u201311 (2004)","DOI":"10.1109\/FOCS.2004.55"},{"issue":"2","key":"11_CR19","doi-asserted-by":"publisher","first-page":"022341","DOI":"10.1103\/PhysRevA.72.022341","volume":"72","author":"C Mochon","year":"2005","unstructured":"Mochon, C.: Large family of quantum weak coin-flipping protocols. Phys. Rev. A 72(2), 022341 (2005)","journal-title":"Phys. Rev. A"},{"key":"11_CR20","unstructured":"Mochon C.: Quantum weak coin flipping with arbitrarily small bias (2007)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Ogawa, T., Nagaoka, H.: A new proof of the channel coding theorem via hypothesis testing in quantum information theory. In: IEEE International Symposium on Information Theory, p. 73 (2002)","DOI":"10.1109\/ISIT.2002.1023345"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"3717","DOI":"10.1038\/ncomms4717","volume":"5","author":"A Pappa","year":"2014","unstructured":"Pappa, A., et al.: Experimental plug and play quantum coin flipping. Nature Commun. 5, 3717 (2014)","journal-title":"Nature Commun."},{"key":"11_CR23","unstructured":"Renner, R.: Security of quantum key distribution. Ph.D. thesis, ETH Z\u00fcrich (2005)"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1038\/nphys684","volume":"3","author":"R Renner","year":"2007","unstructured":"Renner, R.: Symmetry of large physical systems implies independence of subsystems. Nature Phys. 3, 645\u2013649 (2007)","journal-title":"Nature Phys."},{"key":"11_CR25","first-page":"66","volume":"26","author":"R Renner","year":"2010","unstructured":"Renner, R.: Simplifying information-theoretic arguments by post-selection. Quantum Cryptogr. Comput. 26, 66\u201375 (2010)","journal-title":"Quantum Cryptogr. Comput."},{"issue":"04","key":"11_CR26","doi-asserted-by":"publisher","first-page":"1450041","DOI":"10.1142\/S0219749914500415","volume":"13","author":"L Salvail","year":"2015","unstructured":"Salvail, L., Schaffner, C., Sot\u00e1kov\u00e1, M.: Quantifying the leakage of quantum protocols for classical two-party cryptography. Int. J. Quantum Inf. 13(04), 1450041 (2015)","journal-title":"Int. J. Quantum Inf."},{"issue":"1","key":"11_CR27","doi-asserted-by":"publisher","first-page":"012310","DOI":"10.1103\/PhysRevA.65.012310","volume":"65","author":"RW Spekkens","year":"2001","unstructured":"Spekkens, R.W., Rudolph, T.: Degrees of concealment and bindingness in quantum bit commitment protocols. Phys. Rev. A 65(1), 012310 (2001)","journal-title":"Phys. Rev. A"},{"issue":"22","key":"11_CR28","doi-asserted-by":"publisher","first-page":"227901","DOI":"10.1103\/PhysRevLett.89.227901","volume":"89","author":"RW Spekkens","year":"2002","unstructured":"Spekkens, R.W., Rudolph, T.: Quantum protocol for cheat-sensitive weak coin flipping. Phys. Rev. Lett. 89(22), 227901 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"11_CR29","doi-asserted-by":"publisher","first-page":"3123","DOI":"10.1109\/TIT.2014.2314467","volume":"60","author":"S Winkler","year":"2014","unstructured":"Winkler, S., Wullschleger, J.: On the efficiency of classical and quantum secure function evaluation. IEEE Trans. Inf. Theory 60(6), 3123\u20133143 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"11_CR30","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1109\/18.796385","volume":"45","author":"A Winter","year":"1999","unstructured":"Winter, A.: Coding theorem and strong converse for quantum channels. IEEE Trans. Inf. Theory 45(7), 2481\u20132485 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"35","key":"11_CR31","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1088\/0305-4470\/34\/35\/335","volume":"34","author":"K Zyczkowski","year":"2001","unstructured":"Zyczkowski, K., Sommers, H.-J.: Induced measures in the space of mixed quantum states. J. Phys. A Math. Gen. 34(35), 7111 (2001)","journal-title":"J. Phys. A Math. Gen."}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03810-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:20:53Z","timestamp":1775262053000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03810-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030038090","9783030038106"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03810-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Theory of Cryptography Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Panaji","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tcc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/tcc.iacr.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}