{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:46:55Z","timestamp":1744872415721,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T00:00:00Z","timestamp":1546387200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST107-2636-E-009-005","MOST 103-2221-E-001-022-MY3"],"award-info":[{"award-number":["MOST107-2636-E-009-005","MOST 103-2221-E-001-022-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001869","name":"Academia Sinica","doi-asserted-by":"publisher","award":["No. 23-17"],"award-info":[{"award-number":["No. 23-17"]}],"id":[{"id":"10.13039\/501100001869","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10623-018-00597-3","type":"journal-article","created":{"date-parts":[[2019,1,2]],"date-time":"2019-01-02T03:33:55Z","timestamp":1546400035000},"page":"1961-1972","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Quantum encryption and generalized Shannon impossibility"],"prefix":"10.1007","volume":"87","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1970-8167","authenticated-orcid":false,"given":"Ching-Yi","family":"Lai","sequence":"first","affiliation":[]},{"given":"Kai-Min","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"597_CR1","unstructured":"Ambainis A., Mosca M., Tapp A., Wolf R.D.: Private quantum channels. In: Proceedings of the 41st Annual Symposium on Foundations of Computer Science, pp. 547\u2013553 (2000)."},{"key":"597_CR2","unstructured":"Ambainis A., Smith A.: Small pseudo-random families of matrices: derandomizing approximate quantum encryption. In: Proceedings of RANDOM, Series. Lecture Notes in Computer Science, pp. 249\u2013260. Springer, Berlin (2004)."},{"key":"597_CR3","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin P.O., Roychowdhury V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003).","journal-title":"Phys. Rev. A"},{"issue":"4","key":"597_CR4","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s11128-009-0111-3","volume":"8","author":"SP Desrosiers","year":"2009","unstructured":"Desrosiers S.P.: Entropic security in quantum cryptography. Quant. Inf. Process. 8(4), 331\u2013345 (2009).","journal-title":"Quant. Inf. Process."},{"issue":"7","key":"597_CR5","doi-asserted-by":"publisher","first-page":"3455","DOI":"10.1109\/TIT.2010.2048488","volume":"56","author":"SP Desrosiers","year":"2010","unstructured":"Desrosiers S.P., Dupuis F.: Quantum entropic security and approximate quantum encryption. IEEE Trans. Inf. Theory 56(7), 3455\u20133464 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"597_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1063\/1.2400876","volume":"864","author":"PA Dickinson","year":"2006","unstructured":"Dickinson P.A., Nayak A.: Approximate randomization of quantum states with fewer bits of key. AIP Conference Proceedings 864(1), 18\u201336 (2006).","journal-title":"AIP Conference Proceedings"},{"issue":"11","key":"597_CR7","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1023\/A:1026013201376","volume":"33","author":"DP DiVincenzo","year":"2003","unstructured":"DiVincenzo D.P., Hayden P., Terhal B.M.: Hiding quantum data. Found. Phys. 33(11), 1629\u20131647 (2003).","journal-title":"Found. Phys."},{"key":"597_CR8","unstructured":"Dodis Y.: Shannon impossibility, revisited. In: A Smith (ed.) Information Theoretic Security: 6th International Conference, ICITS, Montreal, QC, Canada, August 15\u201317, pp. 100\u2013110, 2012. Springer, Berlin (2012)."},{"key":"597_CR9","unstructured":"Dodis Y., Smith A.: Entropic security and the encryption of high entropy messages. In: Proceedings of the Second International Conference on Theory of Cryptography, Series. TCC\u201905, pp. 556\u2013577. Springer, Berlin (2005)."},{"issue":"4","key":"597_CR10","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/18.761271","volume":"45","author":"CA Fuchs","year":"1999","unstructured":"Fuchs C.A., van de Graaf J.: Cryptographic distinguishability measures for quantum-mechanical states. IEEE Trans. Inf. Theory 45(4), 1216\u20131227 (1999).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"597_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser S., Micali S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984).","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"597_CR12","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s00220-004-1087-6","volume":"250","author":"P Hayden","year":"2004","unstructured":"Hayden P., Leung D., Shor P.W., Winter A.: Randomizing quantum states: constructions and applications. Commun. Math. Phys. 250(2), 371\u2013391 (2004).","journal-title":"Commun. Math. Phys."},{"issue":"1","key":"597_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0375-9601(93)90880-9","volume":"183","author":"LP Hughston","year":"1993","unstructured":"Hughston L.P., Jozsa R., Wootters W.K.: A complete classification of quantum ensembles having a given density matrix. Phys. Lett. A 183(1), 14\u201318 (1993).","journal-title":"Phys. Lett. A"},{"key":"597_CR14","doi-asserted-by":"crossref","unstructured":"Iwamoto M., Ohta K.: Security notions for information theoretically secure encryptions. In: 2011 IEEE International Symposium on Information Theory Proceedings, pp. 1777\u20131781 (2011).","DOI":"10.1109\/ISIT.2011.6033854"},{"issue":"1","key":"597_CR15","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TIT.2017.2744650","volume":"64","author":"M Iwamoto","year":"2018","unstructured":"Iwamoto M., Ohta K., Shikata J.: Security formalizations and their relationships for encryption and key agreement in information-theoretic cryptography. IEEE Trans. Inf. Theory 64(1), 654\u2013685 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"597_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-010-9076-8","volume":"25","author":"R Jain","year":"2012","unstructured":"Jain R.: Resource requirements of private quantum channels and consequences for oblivious remote state preparation. J. Cryptol. 25(1), 1\u201313 (2012).","journal-title":"J. Cryptol."},{"issue":"9","key":"597_CR17","doi-asserted-by":"publisher","first-page":"4337","DOI":"10.1109\/TIT.2009.2025545","volume":"55","author":"R Konig","year":"2009","unstructured":"Konig R., Renner R., Schaffner C.: The operational meaning of min- and max-entropy. IEEE Trans. Inf. Theory 55(9), 4337\u20134347 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9&10","key":"597_CR18","first-page":"0785","volume":"18","author":"C-Y Lai","year":"2018","unstructured":"Lai C.-Y., Chung K.-M.: On statistically-secure quantum homomorphic encryption. Quant. Inf. Comput. 18(9&10), 0785\u20130794 (2018).","journal-title":"Quant. Inf. Comput."},{"issue":"9","key":"597_CR19","doi-asserted-by":"publisher","first-page":"092102","DOI":"10.1063\/1.2339014","volume":"47","author":"D Nagaj","year":"2006","unstructured":"Nagaj D., Kerenidis I.: On the optimality of quantum encryption schemes. J. Math. Phys. 47(9), 092102 (2006).","journal-title":"J. Math. Phys."},{"issue":"1","key":"597_CR20","first-page":"103","volume":"7","author":"A Nayak","year":"2007","unstructured":"Nayak A., Sen P.: Invertible quantum operations and perfect encryption of quantum states. Quant. Inf. Comput. 7(1), 103\u2013110 (2007).","journal-title":"Quant. Inf. Comput."},{"key":"597_CR21","doi-asserted-by":"publisher","first-page":"042334","DOI":"10.1103\/PhysRevA.98.042334","volume":"98","author":"Y Ouyang","year":"2018","unstructured":"Ouyang Y., Tan S.-H., Fitzsimons J.F.: Quantum homomorphic encryption from quantum codes. Phys. Rev. A 98, 042334 (2018).","journal-title":"Phys. Rev. A"},{"issue":"3","key":"597_CR22","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1109\/TIT.2005.864438","volume":"52","author":"A Russell","year":"2006","unstructured":"Russell A., Wang H.: How to fool an unbounded adversary with a short key. IEEE Trans. Inf. Theory 52(3), 1130\u20131140 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"597_CR23","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656\u2013719 (1949).","journal-title":"Bell Syst. Tech. J."},{"key":"597_CR24","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0034-4877(76)90060-4","volume":"9","author":"A Uhlmann","year":"1976","unstructured":"Uhlmann A.: The Transition Probability in the state space of a *-algebra. Rep. Math. Phys. 9, 273\u2013279 (1976).","journal-title":"Rep. Math. Phys."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-00597-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-00597-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-00597-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T19:09:22Z","timestamp":1577905762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-00597-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,2]]},"references-count":24,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["597"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-00597-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2019,1,2]]},"assertion":[{"value":"3 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}