{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:50:36Z","timestamp":1776955836164,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540245735","type":"print"},{"value":"9783540305767","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30576-7_22","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T15:03:26Z","timestamp":1278255806000},"page":"407-425","source":"Crossref","is-referenced-by-count":169,"title":["Universally Composable Privacy Amplification Against Quantum Adversaries"],"prefix":"10.1007","author":[{"given":"Renato","family":"Renner","sequence":"first","affiliation":[]},{"given":"Robert","family":"K\u00f6nig","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Schulman, L.J., Ta-Shma, A., Vazirani, U., Wigderson, A.: The quantum communication complexity of sampling. In: Proceedings of the 39th Annual Symposium on Foundations of Computer Science, pp. 342\u2013351 (1998)","DOI":"10.1109\/SFCS.1998.743480"},{"key":"22_CR2","unstructured":"Ben-Or, M.: Security of BB84 QKD Protocol (2002), Slides available at http:\/\/www.msri.org\/publications\/ln\/msri\/2002\/quantumintro\/ben-or\/2\/"},{"key":"22_CR3","unstructured":"Ben-Or, M., Horodecki, M., Leung, D., Mayers, D., Oppenheim, J.: Composability of QKD (2002), Slides available at http:\/\/www.msri.org\/publications\/ln\/msri\/2002\/qip\/mayers\/1\/ (Part II)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-540-30576-7_21","volume-title":"Theory of Cryptography","author":"M. Ben-Or","year":"2005","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 386\u2013406. Springer, Heidelberg (2005)"},{"key":"22_CR5","unstructured":"Ben-Or, M., Mayers, D.: Quantum universal composability (2002), Slides available at http:\/\/www.msri.org\/publications\/ln\/msri\/2002\/quantumcrypto\/mayers\/1\/banner\/01.html"},{"key":"22_CR6","unstructured":"Ben-Or, M., Mayers, D.: General security definition and composability for quantum & classical protocols (2004), Available at http:\/\/arxiv.org\/abs\/quant-ph\/0409062"},{"issue":"21","key":"22_CR7","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters\u00a068(21), 3121\u20133124 (1992)","journal-title":"Physical Review Letters"},{"key":"22_CR8","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"issue":"6","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C.H. Bennett","year":"1995","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Maurer, U.: Generalized privacy amplification. IEEE Transaction on Information Theory\u00a041(6), 1915\u20131923 (1995)","journal-title":"IEEE Transaction on Information Theory"},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C.H. Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM Journal on Computing\u00a017(2), 210\u2013229 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, pp. 136\u2013145 (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. Journal of Computer and System Sciences\u00a018, 143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"22_CR13","unstructured":"Christandl, M., Renner, R., Ekert, A.: A generic security proof for quantum key distribution. (February 2004), Available at http:\/\/arxiv.org\/abs\/quant-ph\/0402131"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., K\u00f6rner, J.: Broadcast channels with confidential messages. IEEE Transactions on Information Theory\u00a024, 339\u2013348 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"key":"22_CR15","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states (June 2003), Available at http:\/\/arxiv.org\/abs\/quant-ph\/0306078"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"67902","DOI":"10.1103\/PhysRevLett.92.067902","volume":"92","author":"D. DiVincenzo","year":"2004","unstructured":"DiVincenzo, D., Horodecki, M., Leung, D., Smolin, J., Terhal, B.: Locking classical correlation in quantum states. Physical Review Letters\u00a092, 67902 (2004)","journal-title":"Physical Review Letters"},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s00145-003-0309-y","volume":"17","author":"S. Dziembowski","year":"2004","unstructured":"Dziembowski, S., Maurer, U.: Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology\u00a017(1), 5\u201326 (2004); Conference version appeared in Proc. of STOC 2002","journal-title":"Journal of Cryptology"},{"issue":"2","key":"22_CR18","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TIT.2002.807289","volume":"49","author":"D. Gottesman","year":"2003","unstructured":"Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Transactions on Information Theory\u00a049(2), 457\u2013475 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"22_CR19","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s00220-004-1087-6","volume":"250","author":"P. Hayden","year":"2004","unstructured":"Hayden, P., Leung, D., Shor, P.W., Winter, A.: Randomizing quantum states: Constructions and applications. Communications in Mathematical Physics\u00a0250(2), 371\u2013391 (2004)","journal-title":"Communications in Mathematical Physics"},{"key":"22_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511810817","volume-title":"Matrix analysis","author":"R.A. Horn","year":"1985","unstructured":"Horn, R.A., Johnson, C.R.: Matrix analysis. Cambridge University Press, Cambridge (1985)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions (extended abstract). In: Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, pp. 12\u201324 (1989)","DOI":"10.1145\/73007.73009"},{"key":"22_CR22","unstructured":"K\u00f6nig, R., Maurer, U., Renner, R.: On the power of quantum memory (May 2003), Available at http:\/\/arxiv.org\/abs\/quant-ph\/0305154"},{"key":"22_CR23","unstructured":"Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret key rate for QKD protocols using one-way classical communication (2004), Available at http:\/\/arxiv.org\/abs\/quant-ph\/0410215"},{"issue":"3","key":"22_CR24","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U.M. Maurer","year":"1993","unstructured":"Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory\u00a039(3), 733\u2013742 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"22_CR25","unstructured":"Nielsen, M.A.: Majorization and its applications to quantum information theory (June 1999), Available at http:\/\/www.qinfo.org\/talks\/1999\/06-maj\/maj.pdf"},{"key":"22_CR26","volume-title":"Quantum computation and quantum information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)"},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1145\/352600.352639","volume-title":"7th ACM Conference on Computer and Communications Security","author":"B. Pfitzmann","year":"2000","unstructured":"Pfitzmann, B., Waidner, M.: Composition and integrity preservation of secure reactive systems. In: 7th ACM Conference on Computer and Communications Security, pp. 245\u2013254. ACM Press, New York (2000)"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Renner, R., Wolf, S.: Smooth R\u00e9nyi entropy and applications. In: Proceedings of the 2004 IEEE International Symposium on Information Theory, p. 233 (2004)","DOI":"10.1109\/ISIT.2004.1365269"},{"key":"22_CR29","first-page":"547","volume-title":"Proceedings of the 4th Berkeley Symp. on Math. Statistics and Prob.","author":"A. R\u00e9nyi","year":"1961","unstructured":"R\u00e9nyi, A.: On measures of entropy and information. In: Proceedings of the 4th Berkeley Symp. on Math. Statistics and Prob., vol.\u00a01, pp. 547\u2013561. Univ. of Calif. Press, Berkeley (1961)"},{"key":"22_CR30","unstructured":"Unruh, D.: Simulatable security for quantum protocols (2004), Available at http:\/\/arxiv.org\/abs\/quant-ph\/0409125"},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022, 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30576-7_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:23:51Z","timestamp":1605741831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30576-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245735","9783540305767"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30576-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}