{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:38:46Z","timestamp":1725745126746},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400834"},{"type":"electronic","value":"9783642400841"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40084-1_19","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T09:56:37Z","timestamp":1376474197000},"page":"326-343","source":"Crossref","is-referenced-by-count":2,"title":["Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Dupuis","sequence":"first","affiliation":[]},{"given":"Omar","family":"Fawzi","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Wehner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"19_CR1","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1007\/s00453-002-0980-7","volume":"34","author":"S. Bandyopadhyay","year":"2002","unstructured":"Bandyopadhyay, S., Boykin, P., Roychowdhury, V., Vatan, F.: A new proof for the existence of mutually unbiased bases. Algorithmica\u00a034(4), 512\u2013528 (2002) arXiv:quant-ph\/0103162","journal-title":"Algorithmica"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"2097","DOI":"10.1063\/1.1459754","volume":"43","author":"H. Barnum","year":"2002","unstructured":"Barnum, H., Knill, E.: Reversing quantum dynamics with near-optimal quantum and classical fidelity. J. Math. Phys.\u00a043, 2097 (2002)","journal-title":"J. Math. Phys."},{"key":"19_CR3","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/18.850671","volume":"46","author":"H. Barnum","year":"2000","unstructured":"Barnum, H., Knill, E., Nielsen, M.A.: On quantum fidelities and channel capacities. IEEE Trans. Inform. Theory\u00a046, 1317\u20131329 (2000) arXiv:quant-ph\/9809010","journal-title":"IEEE Trans. Inform. Theory"},{"key":"19_CR4","unstructured":"Ben-Aroya, A., Regev, O., de Wolf, R.: A hypercontractive inequality for matrix-valued functions with applications to quantum computing and LDCs. In: Proc. IEEE FOCS (2008) arXiv:0705.3806"},{"key":"19_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proc. International Conference on Computers, Systems and Signal Processing (1984)"},{"key":"19_CR6","unstructured":"Berta, M., Brandao, F., Christandl, M., Wehner, S.: Entanglement cost of quantum channels (2011) arXiv:1108.5357"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1007\/978-3-642-32009-5_45","volume-title":"CRYPTO","author":"M. Berta","year":"2012","unstructured":"Berta, M., Fawzi, O., Wehner, S.: Quantum to classical randomness extractors. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 776\u2013793. Springer, Heidelberg (2012)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-642-31178-9","volume-title":"TQC","author":"N.J. Bouman","year":"2012","unstructured":"Bouman, N.J., Fehr, S., Gonz\u00e1lez-Guill\u00e9n, C., Schaffner, C.: An all-but-one entropic uncertainty relation, and application to password-based identification. In: Iwama, K., Kawano, Y., Murao, M. (eds.) TQC 2012. LNCS, vol.\u00a07582, pp. 29\u201344. Springer, Heidelberg (2012)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/BFb0052243","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"C. Cachin","year":"1997","unstructured":"Cachin, C., Maurer, U.M.: Unconditional security against memory-bounded adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 292\u2013306. Springer, Heidelberg (1997)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-74143-5_20","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"I. Damg\u00e5rd","year":"2007","unstructured":"Damg\u00e5rd, I., Fehr, S., Renner, R., Salvail, L., Schaffner, C.: A tight high-order entropic quantum uncertainty relation with applications. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 360\u2013378. Springer, Heidelberg (2007)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: Proc. IEEE FOCS, pp. 449\u2013458 (2005) arXiv:quant-ph\/0508222","DOI":"10.7146\/brics.v12i20.21886"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-74143-5_19","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"I.B. Damg\u00e5rd","year":"2007","unstructured":"Damg\u00e5rd, I.B., Fehr, S., Salvail, L., Schaffner, C.: Secure identification and QKD in the bounded-quantum-storage model. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 342\u2013359. Springer, Heidelberg (2007)"},{"key":"19_CR13","unstructured":"Dupuis, F., Fawzi, O., Wehner, S.: Entanglement sampling and applications (2013) arXiv:1305.1316"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-24676-3_8","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"S. Dziembowski","year":"2004","unstructured":"Dziembowski, S., Maurer, U.: On generating the initial key in the bounded-storage model. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 126\u2013137. Springer, Heidelberg (2004)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Levin, L., Luby, M.: Pseudo-random generation from one-way functions. In: Proc. ACM STOC, pp. 12\u201324. ACM (1989)","DOI":"10.1145\/73007.73009"},{"key":"19_CR16","doi-asserted-by":"crossref","first-page":"4674","DOI":"10.1109\/TIT.2009.2025545","volume":"55","author":"R. K\u00f6nig","year":"2009","unstructured":"K\u00f6nig, R., Renner, R., Schaffner, C.: The operational meaning of min- and max-entropy. IEEE Trans. Inform. Theory\u00a055, 4674\u20134681 (2009) arXiv:0807.1338","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"19_CR17","doi-asserted-by":"crossref","first-page":"1962","DOI":"10.1109\/TIT.2011.2177772","volume":"58","author":"R. K\u00f6nig","year":"2012","unstructured":"K\u00f6nig, R., Wehner, S., Wullschleger, J.: Unconditional security from noisy quantum storage. IEEE Trans. Inform. Theory\u00a058(3), 1962\u20131984 (2012) arXiv:0906.1030","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"7","key":"19_CR18","doi-asserted-by":"crossref","first-page":"4760","DOI":"10.1109\/TIT.2011.2146730","volume":"57","author":"R. K\u00f6nig","year":"2011","unstructured":"K\u00f6nig, R., Renner, R.: Sampling of min-entropy relative to quantum knowledge. IEEE Trans. Inform. Theory\u00a057(7), 4760\u20134787 (2011) arXiv:0712.4291","journal-title":"IEEE Trans. Inform. Theory"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","volume":"78","author":"H.-K. Lo","year":"1997","unstructured":"Lo, H.-K., Chau, H.F.: Is quantum bit commitment really possible? Phys. Rev. Lett.\u00a078, 3410 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Mandayam, P., Wehner, S.: Achieving the physical limits of the bounded-storage model. Phys. Rev. A.\u00a083, 022329 (2011) arXiv:1009.1596","DOI":"10.1103\/PhysRevA.83.022329"},{"key":"19_CR21","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/BF00191321","volume":"5","author":"U. Maurer","year":"1992","unstructured":"Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptol.\u00a05, 53\u201366 (1992)","journal-title":"J. Cryptol."},{"key":"19_CR22","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D. Mayers","year":"1997","unstructured":"Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett.\u00a078, 3414\u20133417 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"19_CR23","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1038\/ncomms2268","volume":"3","author":"N. Ng","year":"2012","unstructured":"Ng, N., Joshi, S., Chia, C., Kurtsiefer, C., Wehner, S.: Experimental implementation of bit commitment in the noisy-storage model. Nat. Comm.\u00a03, 1326 (2012)","journal-title":"Nat. Comm."},{"issue":"1","key":"19_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1006\/jcss.1996.0004","volume":"52","author":"N. Nisan","year":"1996","unstructured":"Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci.\u00a052(1), 43\u201352 (1996)","journal-title":"J. Comput. Syst. Sci."},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf.\u00a06, 1 (2008) arXiv:quant-ph\/0512258","DOI":"10.1142\/S0219749908003256"},{"key":"19_CR26","unstructured":"Schaffner, C., Terhal, B., Wehner, S.: Robust cryptography in the noisy-quantum-storage model. Quantum Inf. Comput.\u00a09, 11 (2008) arXiv:0807.1333"},{"key":"19_CR27","unstructured":"Tomamichel, M.: A Framework for Non-Asymptotic Quantum Information Theory. PhD thesis, ETH Z\u00fcrich (2012) arXiv:1203"},{"key":"19_CR28","doi-asserted-by":"crossref","first-page":"5840","DOI":"10.1109\/TIT.2009.2032797","volume":"55","author":"M. Tomamichel","year":"2009","unstructured":"Tomamichel, M., Colbeck, R., Renner, R.: A fully quantum asymptotic equipartition property. IEEE Trans. Inform. Theory\u00a055, 5840\u20135847 (2009) arXiv:0811.1221","journal-title":"IEEE Trans. Inform. Theory"},{"key":"19_CR29","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1038\/ncomms1631","volume":"3","author":"M. Tomamichel","year":"2012","unstructured":"Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Comm.\u00a03, 634 (2012)","journal-title":"Nat. Comm."},{"key":"19_CR30","unstructured":"Vadhan, S.: Pseudorandomness"},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s00145-003-0237-x","volume":"17","author":"S. Vadhan","year":"2004","unstructured":"Vadhan, S.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. J. Cryptol.\u00a017, 43\u201377 (2004)","journal-title":"J. Cryptol."},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Wehner, S., Schaffner, C., Terhal, B.: Cryptography from noisy storage. Phys. Rev. Lett\u00a0100, 220502 (2008) arXiv:0711.2895","DOI":"10.1103\/PhysRevLett.100.220502"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Wehner, S., Winter, A.: Entropic uncertainty relations\u2014a survey. New J. Phys.\u00a012, 025009 (2010) arXiv:0907.3704","DOI":"10.1088\/1367-2630\/12\/2\/025009"},{"key":"19_CR34","unstructured":"Wullschleger, J.: Bitwise quantum min-entropy sampling and new lower bounds for random access codes (2010) arXiv:1012.2291"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40084-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T23:14:22Z","timestamp":1596323662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40084-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400834","9783642400841"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40084-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}