{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:07:08Z","timestamp":1778152028730,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540245735","type":"print"},{"value":"9783540305767","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30576-7_21","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T19:03:26Z","timestamp":1278270206000},"page":"386-406","source":"Crossref","is-referenced-by-count":111,"title":["The Universal Composable Security of Quantum Key Distribution"],"prefix":"10.1007","author":[{"given":"Michael","family":"Ben-Or","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Horodecki","sequence":"additional","affiliation":[]},{"given":"Debbie W.","family":"Leung","sequence":"additional","affiliation":[]},{"given":"Dominic","family":"Mayers","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Oppenheim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"C. Bennett","year":"1984","unstructured":"Bennett, C., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, New York, pp. 175\u2013179. IEEE, Bangalore (1984)"},{"issue":"6","key":"21_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett.\u00a067(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"21_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C. Bennett","year":"1992","unstructured":"Bennett, C.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett.\u00a068(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"21_CR4","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1080\/09500349414552161","volume":"41","author":"C. Bennett","year":"1994","unstructured":"Bennett, C., Brassard, G., Jozsa, R., Mayers, D., Peres, A., Schumacher, B., Wootters, W.: Reduction of quantum entropy by reversible extraction of classical information. Journal of Modern Optics\u00a041(12), 2307\u20132314 (1994)","journal-title":"Journal of Modern Optics"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/3-540-68697-5_26","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"D. Mayers","year":"1996","unstructured":"Mayers, D.: Quantum key distribution and string oblivious transfer in noisy channels. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 343\u2013357. Springer, Heidelberg (1996)"},{"key":"21_CR6","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D. Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. Assoc. Comp. Mach\u00a048, 351 (2001) (quant-ph\/9802025)","journal-title":"J. Assoc. Comp. Mach"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H.-K. Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science\u00a0283, 2050\u20132056 (1999) (quant-ph\/9803006)","journal-title":"Science"},{"key":"21_CR8","first-page":"715","volume-title":"Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC)","author":"E. Biham","year":"2000","unstructured":"Biham, E., Boyer, M., Boykin, P., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution. In: Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC), pp. 715\u2013724. ACM, New York (2000) (quant-ph\/9912053)"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P. Shor","year":"2000","unstructured":"Shor, P., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett.\u00a085, 441\u2013444 (2000) (quant-ph\/0003004)","journal-title":"Phys. Rev. Lett."},{"key":"21_CR10","doi-asserted-by":"crossref","first-page":"167904","DOI":"10.1103\/PhysRevLett.90.167904","volume":"90","author":"K. Tamaki","year":"2003","unstructured":"Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett.\u00a090, 167904 (2003) (quant-ph\/0212162)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TIT.2002.807289","volume":"49","author":"G. Gottesman","year":"2003","unstructured":"Gottesman, G., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Transactions on Information Theory\u00a049(2), 457\u2013475 (2003) (quant-ph\/0105121)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR12","unstructured":"Bennett, C., Smolin, J.: First suggested the key degradation problem to one of us, and A. Harrow has obtained partial results."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Mosca, M., Tapp, A., de Wolf, R.: Private quantum channels. In: IEEE Symposium on Foundations of Computer Science (FOCS), pp. 547\u2013553 (2000) (quant-ph\/0003101)","DOI":"10.1109\/SFCS.2000.892142"},{"key":"21_CR14","unstructured":"Boykin, P., Roychowdhury, V.: Optimal encryption of quantum bits (quant-ph\/0003059)"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1103\/PhysRevLett.66.1119","volume":"66","author":"A. Peres","year":"1991","unstructured":"Peres, A., Wootters, W.: Optimal detection of quantum information. Phys. Rev. Lett.\u00a066, 1119\u20131122 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"67902","DOI":"10.1103\/PhysRevLett.92.067902","volume":"92","author":"D. DiVincenzo","year":"2004","unstructured":"DiVincenzo, D., Horodecki, M., Leung, D., Smolin, J., Terhal, B.: Locking classical correlation in quantum states. Phys. Rev. Lett.\u00a092, 67902 (2004) (quant-ph\/0303088)","journal-title":"Phys. Rev. Lett."},{"key":"21_CR17","unstructured":"Hayden, P., Leung, D., Shor, P., Winter, A.: Randomizing quantum state: constructions and applications (quant-ph\/0307104)"},{"key":"21_CR18","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/SFCS.2001.959888","volume-title":"Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS)","author":"R. Canetti","year":"2001","unstructured":"Canetti, R.: Universal composable security: A new paradigm for cryptographic protocols. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pp. 136\u2013145. IEEE, Los Alamitos (2001)"},{"key":"21_CR19","unstructured":"Ben-Or, M., Mayers, D.: Composability theorem. Part I of presentation by D. Mayers, QIP 2003, MSRI, Berkeley, See http:\/\/www.msri.org\/publi-cations\/ln\/msri\/2002\/qip\/mayers\/1\/index.html"},{"key":"21_CR20","unstructured":"Ben-Or, M., Mayers, D.: Composing quantum and classical protocols (quant-ph\/0409062)"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-540-24638-1_19","volume-title":"Theory of Cryptography","author":"M. Backes","year":"2004","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: A general composition theorem for secure reactive systems. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 336\u2013354. Springer, Heidelberg (2004)"},{"key":"21_CR22","unstructured":"Unruh, D.: Relating formal security for classical and quantum protocols. Presentation at the Special week on Quantum crytography, Isaac Newton Institute for Mathematical Sciecnes (September 2004), Available at http:\/\/www.unruh.de\/DniQ\/publications"},{"key":"21_CR23","unstructured":"Unruh, D.: Simulation security for quantum protocols (quant-ph\/0409125)"},{"key":"21_CR24","unstructured":"Ben-Or, M., Horodecki, M., Leung, D., Mayers, D., Oppenheim, J.: Composability of QKD. Part II of presentation by D. Mayers, QIP 2003, MSRI, Berkeley, See http:\/\/www.msri.org\/publi-cations\/ln\/msri\/2002\/qip\/mayers\/1\/index.html"},{"key":"21_CR25","unstructured":"Ben-Or, M., Horodecki, M., Leung, D., Mayers, D., Oppenheim, J.: Composability of quantum proocols - applications to quantum key distribution and quantum authentication. Part II of presentation by D. Leung, QIP 2004, IQC, University of Waterloo, See http:\/\/www.iqc.ca\/conferences\/qip\/presentations\/leung-.pdf"},{"key":"21_CR26","unstructured":"Renner, R., Konig: Universally composable privacy amplification against quantum adversaries (quant-ph\/0403133)"},{"key":"21_CR27","unstructured":"Christandl, M., Renner, R., Ekert, A.: A generic security proof for quantum key distribution (quant-ph\/0402131)"},{"key":"21_CR28","volume-title":"Quantum computation and quantum information","author":"M. Nielsen","year":"2000","unstructured":"Nielsen, M., Chuang, I.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)"},{"key":"21_CR29","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegman","year":"1981","unstructured":"Wegman, M., Carter, J.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022, 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"},{"key":"21_CR30","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D. Bruss","year":"1998","unstructured":"Bruss, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett.\u00a081, 3018\u20133021 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"21_CR31","unstructured":"Bechmann-Pasquinucci, H., Gisin, N.: Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography (quant-ph\/9807041)"},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","volume":"77","author":"D. Deutsch","year":"1996","unstructured":"Deutsch, D., Ekert, A., Jozsa, R., Macchiavello, C., Popescu, S., Sanpera, A.: Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett.\u00a077, 2818 (1996) (quant-ph\/9604039)","journal-title":"Phys. Rev. Lett."},{"key":"21_CR33","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T. Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, New York (1991)"},{"key":"21_CR34","unstructured":"Yao, A.: Quantum circuit complexity. In: Proc. of the 34th Ann. IEEE Symp. on Foundations of Computer Science, pp. 352\u2013361 (1993)"},{"key":"21_CR35","unstructured":"Aharonov, D., Kitaev, A., Nisan, N.: Quantum circuits with mixed states (quant-ph\/9806029)"},{"key":"21_CR36","unstructured":"An acyclic circuit is a partially ordered set of gates. However, associating the circuit with constraints on the timing of the adversarial attack is a delicate issue. Suppose the circuit contains conditional gates controlled by random public classical registers. The gates on the target may or may not be applied depending on the values of the control registers. When the gates are not applied, the associated time-constraints of the adversarial attack disappear. In: the extension to the usual acyclic circuit model, we consider all possible values of the control registers and the resulting sets of nontrivial partially ordered operations, and the corresponding constraints on the adversarial attack"},{"key":"21_CR37","unstructured":"Hayden, P., Leung, D., Mayers, D.: On the composability of quantum message authentication and key recycling"},{"key":"21_CR38","unstructured":"Ben-Or, M., Horodecki, M., Leung, D., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution (quant-ph\/0409078)"},{"issue":"2","key":"21_CR39","first-page":"31","volume":"9","author":"A. Holevo","year":"1973","unstructured":"Holevo, A.: Information-theoretical aspects of quantum measurement. Problemy Peredachi Informatsii\u00a09(2), 31\u201342 (1973); Kholevo, A.S.: Problems of Information Transmission\u00a09, 110\u2013118 (1973)","journal-title":"Problemy Peredachi Informatsii"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30576-7_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T16:16:51Z","timestamp":1740241011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30576-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245735","9783540305767"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30576-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}