{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:29:51Z","timestamp":1743049791291,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642544286"},{"type":"electronic","value":"9783642544293"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54429-3_3","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:33:06Z","timestamp":1394184786000},"page":"23-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Locking-Decoding Frontier for Generic Dynamics"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Dupuis","sequence":"first","affiliation":[]},{"given":"Jan","family":"Florjanczyk","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Hayden","sequence":"additional","affiliation":[]},{"given":"Debbie","family":"Leung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0370-2693(87)91320-7","volume":"191","author":"Y Aharonov","year":"1987","unstructured":"Aharonov, Y., Casher, A., Nussinov, S.: The unitarity puzzle and Planck mass stable particles. Phys. Lett. B 191, 51\u201355 (1987)","journal-title":"Phys. Lett. B"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Abeyesinghe, A., Devetak, I., Hayden, P., Winter, A.: The mother of\u00a0all protocols: Restructuring quantum information\u2019s family tree. In: Proceedings of the Royal Society A, vol. 465, pp. 2537\u20132563 (2009). quant-ph\/0606225","DOI":"10.1098\/rspa.2009.0202"},{"issue":"5","key":"3_CR3","doi-asserted-by":"crossref","first-page":"L55","DOI":"10.1088\/0305-4470\/37\/5\/L01","volume":"37","author":"R. Alicki","year":"2004","unstructured":"Alicki, R., Fannes, M.: Continuity of quantum mutual information. J. Phys. A. Math. Gen. 37(5), L55\u2013L57 (2004). quant-ph\/0312081","journal-title":"J. Phys. A. Math. Gen."},{"key":"3_CR4","doi-asserted-by":"crossref","first-page":"250501","DOI":"10.1103\/PhysRevLett.97.250501","volume":"97","author":"H. Buhrman","year":"2006","unstructured":"Buhrman, H., Christandl, M., Hayden, P., Lo, H.-K., Wehner, S.: Security of quantum bit string commitment depends on the information measure. Phys. Rev. Lett. 97, 250501 (2006). arXiv:quant-ph\/0609237","journal-title":"Phys. Rev. Lett."},{"key":"3_CR5","doi-asserted-by":"crossref","first-page":"022316","DOI":"10.1103\/PhysRevA.78.022316","volume":"78","author":"H. Buhrman","year":"2008","unstructured":"Buhrman, H., Christandl, M., Hayden, P., Lo, H.-K., Wehner, S.: Possibility, impossibility, and cheat-sensitivity of quantum bit string commitment. Phys. Rev. A. 78, 022316 (2008). arXiv:quant-ph\/0504078","journal-title":"Phys. Rev. A."},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"062310","DOI":"10.1103\/PhysRevA.73.062310","volume":"73","author":"R Blume-Kohout","year":"2006","unstructured":"Blume-Kohout, R., Zurek, W.H.: Quantum Darwinism: entanglement, branches, and the emergence of classicality of redundantly stored quantum information. Phys. Rev. A 73, 062310 (2006)","journal-title":"Phys. Rev. A"},{"key":"3_CR7","series-title":"LNCS","first-page":"386","volume-title":"TCC 2005","author":"M Ben-Or","year":"2005","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 386\u2013406. Springer, Heidelberg (2005)"},{"key":"3_CR8","unstructured":"Braunstein, S.L., Sommers, H.J., Zyczkowski, K.: Entangled black holes as ciphers of hidden information (2009). arXiv:0907.0739"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"2336","DOI":"10.1103\/PhysRevD.36.2336","volume":"36","author":"RD Carlitz","year":"1987","unstructured":"Carlitz, R.D., Willey, R.S.: Lifetime of a black hole. Phys. Rev. D 36, 2336\u20132341 (1987)","journal-title":"Phys. Rev. D"},{"key":"3_CR10","unstructured":"Dupuis, F., Florjanczyk, J., Hayden, P., Leung, D.: Locking classical information (2010). arXiv:1011.1612"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"067902","DOI":"10.1103\/PhysRevLett.92.067902","volume":"92","author":"DP DiVincenzo","year":"2004","unstructured":"DiVincenzo, D.P., Horodecki, M., Leung, D.W., Smolin, J.A., Terhal, B.M.: Locking classical correlation in quantum state. Phys. Rev. Lett. 92, 067902 (2004). quant-ph\/0303088","journal-title":"Phys. Rev. Lett."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Fawzi, O., Hayden, P., Sen, P.: From low-distortion embeddings to metric uncertainty relations and information locking (2010). arXiv:1010.3007v3","DOI":"10.1145\/1993636.1993738"},{"key":"3_CR13","unstructured":"Fuchs, C.A.: Distinguishability and accessible information in quantum theory. Ph.D. thesis, University of New Mexico (1996). quant-ph\/9601020"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TIT.2002.807289","volume":"49","author":"D Gottesman","year":"2003","unstructured":"Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theor. 49(2), 457\u2013475 (2003). quant-ph\/0105121","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"3_CR15","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s00220-004-1087-6","volume":"250","author":"P Hayden","year":"2004","unstructured":"Hayden, P., Leung, D.W., Shor, P., Winter, A.: Randomizing quantum states: constructions and applications. Comm. Math. Phys. 250(2), 371\u2013391 (2004). quant-ph\/0307104","journal-title":"Comm. Math. Phys."},{"issue":"09","key":"3_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1088\/1126-6708\/2007\/09\/120","volume":"07","author":"P Hayden","year":"2007","unstructured":"Hayden, P., Preskill, J.: Black holes as mirrors: quantum information in random subsystems. J. High Energy Phys. 07(09), 120 (2007)","journal-title":"J. High Energy Phys."},{"issue":"35","key":"3_CR17","doi-asserted-by":"publisher","first-page":"6899","DOI":"10.1088\/0305-4470\/34\/35\/315","volume":"34","author":"L Henderson","year":"2001","unstructured":"Henderson, L., Vedral, V.: Classical, quantum and total correlations. J. Phys. A Math. Gen. 34(35), 6899 (2001)","journal-title":"J. Phys. A Math. Gen."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"140502","DOI":"10.1103\/PhysRevLett.98.140502","volume":"98","author":"R K\u00f6nig","year":"2007","unstructured":"K\u00f6nig, R., Renner, R., Bariska, A., Maurer, U.: Locking of accessible information and implications for the security of quantum cryptography. Phys. Rev. Lett. 98, 140502 (2007). quant-ph\/0512021","journal-title":"Phys. Rev. Lett."},{"issue":"5410","key":"3_CR19","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.-F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999). quant-ph\/9803006","journal-title":"Science"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Chau, H.-F., Ardehali, M.: Efficient quantum key distribution scheme and proof of its unconditional security. J. Cryptol. 18, 133 (2005). quant-ph\/0011056","journal-title":"J. Cryptol."},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"061302","DOI":"10.1103\/PhysRevLett.96.061302","volume":"96","author":"S Lloyd","year":"2006","unstructured":"Lloyd, S.: Almost certain escape from black holes in final state projection models. Phys. Rev. Lett. 96, 061302 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"3_CR22","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, New York (2000)"},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"017901","DOI":"10.1103\/PhysRevLett.88.017901","volume":"88","author":"H Ollivier","year":"2001","unstructured":"Ollivier, H., Zurek, W.H.: Quantum discord: a measure of the quantumness of correlations. Phys. Rev. Lett. 88, 017901 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Renner, R., K\u00f6nig, R.: Universally composable privacy amplification against quantum adversaries. In: Second Theory of Cryptography Conference (TCC 2005), vol. 3378, pp. 407\u2013425 (2005). quant-ph\/0403133","DOI":"10.1007\/978-3-540-30576-7_22"},{"issue":"8","key":"3_CR25","doi-asserted-by":"publisher","first-page":"081302","DOI":"10.1103\/PhysRevLett.96.081302","volume":"96","author":"J Smolin","year":"2006","unstructured":"Smolin, J., Oppenheim, J.: Locking information in black holes. Phys. Rev. Lett. 96(8), 081302 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P Shor","year":"2000","unstructured":"Shor, P., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 1 (2000). quant-ph\/0003004","journal-title":"Phys. Rev. Lett."},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Sekino, Y., Susskind, L.: Fast scramblers. J. High Energy Phys. 10, 65 (2008). arXiv:0808.2096","DOI":"10.1088\/1126-6708\/2008\/10\/065"},{"key":"3_CR28","doi-asserted-by":"publisher","first-page":"024103","DOI":"10.1103\/PhysRevA.80.024103","volume":"80","author":"T Werlang","year":"2009","unstructured":"Werlang, T., Souza, S., Fanchini, F.F., Villas Boas, C.J.: Robustness of quantum discord to sudden death. Phys. Rev. A 80, 024103 (2009)","journal-title":"Phys. Rev. A"}],"container-title":["Lecture Notes in Computer Science","Theory of Quantum Computation, Communication, and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54429-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T22:14:47Z","timestamp":1675808087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54429-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642544286","9783642544293"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54429-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}