{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:52:29Z","timestamp":1725699149494},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642320088"},{"type":"electronic","value":"9783642320095"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32009-5_45","type":"book-chapter","created":{"date-parts":[[2012,8,6]],"date-time":"2012-08-06T06:40:28Z","timestamp":1344235228000},"page":"776-793","source":"Crossref","is-referenced-by-count":10,"title":["Quantum to Classical Randomness Extractors"],"prefix":"10.1007","author":[{"given":"Mario","family":"Berta","sequence":"first","affiliation":[]},{"given":"Omar","family":"Fawzi","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Wehner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"#cr-split#-45_CR1.1","unstructured":"Ahlswede, R., Winter, A.: Strong converse for identification via quantum channels. IEEE Trans. Inform. Theory 48, 569-579 (2010)"},{"key":"#cr-split#-45_CR1.2","doi-asserted-by":"crossref","unstructured":"Addendum ibid 49, 346 (2003), arXiv:quant-ph\/0012127v2","DOI":"10.1109\/TIT.2002.806161"},{"key":"45_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.4086\/toc.2010.v006a003","volume":"6","author":"A Ben-Aroya","year":"2010","unstructured":"Ben-Aroya, A., Schwartz, O., Ta-Shma, A.: Quantum expanders: Motivation and construction. Theory of Computing 6, 47\u201379 (2010)","journal-title":"Theory of Computing"},{"key":"45_CR3","unstructured":"Berta, M., Brandao, F., Christandl, M., Wehner, S.: Entanglement cost of quantum channels (2011), arXiv:1108.5357"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Berta, M., Christandl, M., Colbeck, R., Renes, J.M., Renner, R.: The uncertainty principle in the presence of quantum memory. Nat. Phys. 6, 659 (2010), arXiv:0909.0950v4","DOI":"10.1038\/nphys1734"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Buhrman, H., Christandl, M., Hayden, P., Lo, H.-K., Wehner, S.: Security of quantum bit string commitment depends on the information measure. Phys. Rev. Lett. 97, 250501 (2006), arXiv:quant-ph\/0609237v2","DOI":"10.1103\/PhysRevLett.97.250501"},{"key":"45_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/BFb0052243","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"C Cachin","year":"1997","unstructured":"Cachin, C., Maurer, U.M.: Unconditional Security against Memory-Bounded Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292\u2013306. Springer, Heidelberg (1997)"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Chau, H.F., Lo, H.-K.: Making an empty promise with a quantum computer. Fortschritte der Physik 46, 507\u2013520 (1998); Republished in Braunstein, S. (ed.) Quantum Computing, where do we want to go tomorrow?, arXiv:quant-ph\/9709053v2","DOI":"10.1002\/(SICI)1521-3978(199806)46:4\/5<507::AID-PROP507>3.0.CO;2-4"},{"key":"45_CR8","unstructured":"Colbeck, R.: Quantum and relativistic protocols for secure multi-party computation. PhD thesis. University of Cambridge (2006), arXiv:0911.3814v2"},{"key":"45_CR9","doi-asserted-by":"crossref","first-page":"095305","DOI":"10.1088\/1751-8113\/44\/9\/095305","volume":"44","author":"R. Colbeck","year":"2011","unstructured":"Colbeck, R., Kent, A.: Private randomness expansion with untrusted devices. J. Phys. A - Math. Gen. 44, 095305 (2011), arXiv:1011.4474v3","journal-title":"J. Phys. A - Math. Gen."},{"key":"45_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-74143-5_20","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"IB Damg\u00e5rd","year":"2007","unstructured":"Damg\u00e5rd, I.B., Fehr, S., Renner, R.S., Salvail, L., Schaffner, C.: A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 360\u2013378. Springer, Heidelberg (2007), arXiv:quant-ph\/0612014v2"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.B., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the Bounded-Quantum-Storage Model. In: Proc. IEEE FOCS, pp. 449\u2013458 (2005), arXiv:quant-ph\/0508222v2","DOI":"10.7146\/brics.v12i20.21886"},{"key":"45_CR12","unstructured":"De, A., Portmann, C., Vidick, T., Renner, R.: Trevisan\u2019s extractor in the presence of quantum side information (2009), arXiv:0912.5514"},{"key":"45_CR13","unstructured":"Dupuis, F.: The Decoupling Approach to Quantum Information Theory. PhD thesis, Universit\u00e9 de Montr\u00e9al (2009), arXiv:1004.1641v1"},{"key":"45_CR14","unstructured":"Dupuis, F., Berta, M., Wullschleger, J., Renner, R.: The decoupling theorem (2010), arXiv:1012.6044v1"},{"key":"45_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-24676-3_8","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"S Dziembowski","year":"2004","unstructured":"Dziembowski, S., Maurer, U.: On Generating the Initial Key in the Bounded-Storage Model. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 126\u2013137. Springer, Heidelberg (2004)"},{"key":"45_CR16","doi-asserted-by":"crossref","unstructured":"Fawzi, O., Hayden, P., Sen, P.: From low-distortion norm embeddings to explicit uncertainty relations and efficient information locking. In: Proc. ACM STOC (2011), arXiv:1010.3007v3","DOI":"10.1145\/1993636.1993738"},{"key":"45_CR17","doi-asserted-by":"crossref","unstructured":"Gavinsky, D., Kempe, J., Kerenidis, I., Raz, R., de Wolf, R.: Exponential separations for one-way quantum communication complexity, with applications to cryptography. In: Proc. ACM STOC, pp. 516\u2013525. ACM (2007)","DOI":"10.1145\/1250790.1250866"},{"key":"45_CR18","unstructured":"Hayden, P., Horodecki, M., Yard, J., Winter, A.: A decoupling approach to the quantum capacity. Open. Syst. Inf. Dyn. 15, 7\u201319 (2008), arXiv:quant-ph\/0702005v1"},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: Proc. ACM STOC, pp. 12\u201324. ACM (1989)","DOI":"10.1145\/73007.73009"},{"key":"45_CR20","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding cryptography on oblivious transfer. In: Proc. ACM STOC, pp. 20\u201331 (1988)","DOI":"10.1145\/62212.62215"},{"key":"45_CR21","unstructured":"K\u00f6nig, R., Maurer, U., Renner, R.: On the power of quantum memory. IEEE Trans. Inform. Theory 51, 2391\u20132401 (2005), arXiv:quant-ph\/0305154v3"},{"key":"45_CR22","doi-asserted-by":"crossref","unstructured":"K\u00f6nig, R., Renner, R., Schaffner, C.: The operational meaning of min- and max-entropy. IEEE Transactions on Information Theory 55, 4674\u20134681 (2009), arXiv:0807.1338v1","DOI":"10.1109\/TIT.2009.2025545"},{"key":"45_CR23","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/TIT.2007.913245","volume":"54","author":"R K\u00f6nig","year":"2008","unstructured":"K\u00f6nig, R., Terhal, B.M.: The bounded-storage model in the presence of a quantum adversary. IEEE Trans. Inform. Theory 54, 749\u2013762 (2008)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"45_CR24","unstructured":"K\u00f6nig, R., Wehner, S., Wullschleger, J.: Unconditional security from noisy quantum storage. IEEE Trans. Inform. Theory 58(3), 1962\u20131984 (2012), arXiv:0906.1030v3"},{"key":"45_CR25","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"H-K Lo","year":"1997","unstructured":"Lo, H.-K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154 (1997)","journal-title":"Phys. Rev. A"},{"key":"45_CR26","doi-asserted-by":"publisher","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","volume":"78","author":"H-K Lo","year":"1997","unstructured":"Lo, H.-K., Chau, H.F.: Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"45_CR27","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1103\/PhysRevLett.60.1103","volume":"60","author":"H Maassen","year":"1988","unstructured":"Maassen, H., Uffink, J.: Generalised entropic uncertainty relations. Phys. Rev. Lett. 60, 1103\u20131106 (1988)","journal-title":"Phys. Rev. Lett."},{"key":"45_CR28","doi-asserted-by":"crossref","first-page":"022329","DOI":"10.1103\/PhysRevA.83.022329","volume":"83","author":"P. Mandayam","year":"2011","unstructured":"Mandayam, P., Wehner, S.: Achieving the physical limits of the bounded-storage model. Phys. Rev. A 83, 022329 (2011), arXiv:1009.1596v2","journal-title":"Phys. Rev. A"},{"key":"45_CR29","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/BF00191321","volume":"5","author":"U Maurer","year":"1992","unstructured":"Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptol. 5, 53\u201366 (1992)","journal-title":"J. Cryptol."},{"key":"45_CR30","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D Mayers","year":"1997","unstructured":"Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414\u20133417 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"45_CR31","doi-asserted-by":"crossref","unstructured":"Pironio, S., Acin, A., Massar, S., de la Giroday, A.B., Matsukevich, D.N., Maunz, P., Olmschenk, S., Hayes, D., Luo, L.: Random numbers certified by Bell\u2019s theorem. Nature 464, 1021\u20131024 (2010), arXiv:0911.3427v3","DOI":"10.1038\/nature09008"},{"key":"45_CR32","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1137\/S0895480197329508","volume":"13","author":"J Radhakrishnan","year":"2000","unstructured":"Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM J. Discrete Math. 13, 2 (2000)","journal-title":"SIAM J. Discrete Math."},{"key":"45_CR33","doi-asserted-by":"crossref","first-page":"020402","DOI":"10.1103\/PhysRevLett.103.020402","volume":"103","author":"J.M. Renes","year":"2009","unstructured":"Renes, J.M., Boileau, J.-C.: Conjectured strong complementary information tradeoff. Phys. Rev. Lett. 103, 020402 (2009), arXiv:0806.3984v2","journal-title":"Phys. Rev. Lett."},{"key":"45_CR34","doi-asserted-by":"crossref","unstructured":"Renner, R.: Security of quantum key distribution. International Journal of Quantum Information 6, 1 (2008), arXiv:quant-ph\/0512258v2","DOI":"10.1142\/S0219749908003256"},{"key":"45_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-30576-7_22","volume-title":"Theory of Cryptography","author":"RS Renner","year":"2005","unstructured":"Renner, R.S., K\u00f6nig, R.: Universally Composable Privacy Amplification Against Quantum Adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407\u2013425. Springer, Heidelberg (2005), arXiv:quant-ph\/0403133v2"},{"key":"45_CR36","doi-asserted-by":"crossref","unstructured":"Schaffner, C., Terhal, B., Wehner, S.: Robust cryptography in the noisy-quantum-storage model. Quantum Inf. Comput. 9, 11 (2008), arXiv:0807.1333v3","DOI":"10.26421\/QIC9.11-12-4"},{"key":"45_CR37","first-page":"67","volume":"77","author":"R Shaltiel","year":"2002","unstructured":"Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67\u201395 (2002)","journal-title":"Bulletin of the EATCS"},{"key":"45_CR38","unstructured":"Szehr, O., Dupuis, F., Tomamichel, M., Renner, R.: Decoupling with unitary almost two-designs (2011), arXiv:1109.4348"},{"key":"45_CR39","doi-asserted-by":"crossref","unstructured":"Ta-Shma, A.: Short seed extractors against quantum storage. In: Proc. ACM STOC, pp. 401\u2013408. ACM (2009)","DOI":"10.1145\/1536414.1536470"},{"key":"45_CR40","doi-asserted-by":"crossref","unstructured":"Tomamichel, M., Colbeck, R., Renner, R.: Duality between smooth min- and max-entropies. IEEE Trans. Inform. Theory 56, 4674 (2010), arXiv:0907.5238v2","DOI":"10.1109\/TIT.2010.2054130"},{"key":"45_CR41","doi-asserted-by":"crossref","unstructured":"Tomamichel, M., Renner, R.: The uncertainty relation for smooth entropies. Phys. Rev. Lett. 106, 110506 (2011), arXiv:1009.2015v2","DOI":"10.1103\/PhysRevLett.106.110506"},{"key":"45_CR42","unstructured":"Tomamichel, M., Schaffner, C., Smith, A., Renner, R.: Leftover hashing against quantum side information. IEEE Trans. Inform. Theory 57(8), 5524\u20135535 (2011), arXiv:1002.2436v1"},{"key":"45_CR43","doi-asserted-by":"crossref","first-page":"052336","DOI":"10.1103\/PhysRevA.81.052336","volume":"81","author":"S. Wehner","year":"2010","unstructured":"Wehner, S., Curty, M., Schaffner, C., Lo, H.-K.: Implementation of two-party protocols in the noisy-storage model. Phys. Rev. A 81, 052336 (2010), arXiv:0911.2302v2","journal-title":"Phys. Rev. A"},{"key":"45_CR44","doi-asserted-by":"crossref","unstructured":"Wehner, S., Schaffner, C., Terhal, B.: Cryptography from noisy storage. Phys. Rev. Lett. 100, 220502 (2008), arXiv:0711.2895v3","DOI":"10.1103\/PhysRevLett.100.220502"},{"key":"45_CR45","doi-asserted-by":"crossref","first-page":"025009","DOI":"10.1088\/1367-2630\/12\/2\/025009","volume":"12","author":"S. Wehner","year":"2010","unstructured":"Wehner, S., Winter, A.: Entropic uncertainty relations - a survey. New J. Phys. 12, 025009 (2010), arXiv:0907.3704v1","journal-title":"New J. Phys."},{"key":"45_CR46","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1038\/nphys1771","volume":"6","author":"A Winter","year":"2010","unstructured":"Winter, A.: Quantum information: Coping with uncertainty. Nat. Phys. 6, 640 (2010)","journal-title":"Nat. Phys."},{"key":"45_CR47","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/0003-4916(89)90322-9","volume":"191","author":"WK Wootters","year":"1989","unstructured":"Wootters, W.K., Fields, B.D.: Optimal state-determination by mutually unbiased measurements. Ann. Physics 191, 363\u2013381 (1989)","journal-title":"Ann. Physics"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32009-5_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T19:08:58Z","timestamp":1643137738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32009-5_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642320088","9783642320095"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32009-5_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}