{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:53Z","timestamp":1750307333798,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T00:00:00Z","timestamp":1307318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,6]]},"DOI":"10.1145\/1993636.1993738","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T11:53:52Z","timestamp":1307361232000},"page":"773-782","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["From low-distortion norm embeddings to explicit uncertainty relations and efficient information locking"],"prefix":"10.1145","author":[{"given":"Omar","family":"Fawzi","sequence":"first","affiliation":[{"name":"McGill University, Montreal, PQ, Canada"}]},{"given":"Patrick","family":"Hayden","sequence":"additional","affiliation":[{"name":"McGill University, Montreal, PQ, Canada"}]},{"given":"Pranab","family":"Sen","sequence":"additional","affiliation":[{"name":"Tata Institute of Fundamental Research, Mumbai, India"}]}],"member":"320","published-online":{"date-parts":[[2011,6,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.42172"},{"key":"e_1_3_2_2_2_1","volume-title":"Hastings' additivity counterexample via Dvoretzky's theorem","author":"Aubrun G.","year":"2010","unstructured":"G. Aubrun , S. Szarek , and E. Werner . Hastings' additivity counterexample via Dvoretzky's theorem . 2010 , \\hrefhttp:\/\/arxiv.org\/abs\/1003.4925arXiv:1003.4925. G. Aubrun, S. Szarek, and E. Werner. Hastings' additivity counterexample via Dvoretzky's theorem. 2010, \\hrefhttp:\/\/arxiv.org\/abs\/1003.4925arXiv:1003.4925."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.3271044"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.75.022319"},{"key":"e_1_3_2_2_5_1","volume-title":"Proc. IEEE International Conference on Computers, Systems and Signal Processing","author":"Bennett C. H.","year":"1984","unstructured":"C. H. Bennett and G. Brassard . Quantum cryptography: Public key distribution and coin tossing . Proc. IEEE International Conference on Computers, Systems and Signal Processing , 1984 . C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. Proc. IEEE International Conference on Computers, Systems and Signal Processing, 1984."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.97.250501"},{"key":"e_1_3_2_2_7_1","first-page":"360","volume-title":"A tight high-order entropic quantum uncertainty relation with applications. Advances in Cryptology -- CRYPTO","author":"Damg\u00e5rd I.","year":"2007","unstructured":"I. Damg\u00e5rd , S. Fehr , R. Renner , L. Salvail , and C. Schaffner . A tight high-order entropic quantum uncertainty relation with applications. Advances in Cryptology -- CRYPTO , pp. 360 -- 378 , 2007 , http:\/\/arxiv.org\/abs\/quant-ph\/0612014arXiv:quant-ph\/0612014. I. Damg\u00e5rd, S. Fehr, R. Renner, L. Salvail, and C. Schaffner. A tight high-order entropic quantum uncertainty relation with applications. Advances in Cryptology -- CRYPTO, pp. 360--378, 2007, http:\/\/arxiv.org\/abs\/quant-ph\/0612014arXiv:quant-ph\/0612014."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.30"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.80.012304"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048488"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.50.631"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.067902"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_30"},{"key":"e_1_3_2_2_14_1","volume-title":"Locking classical information","author":"Dupuis F.","year":"2010","unstructured":"F. Dupuis , J. Florjanczyk , P. Hayden , and D. Leung . Locking classical information . 2010 , http:\/\/arxiv.org\/abs\/1011.1612arXiv:1011.1612. F. Dupuis, J. Florjanczyk, P. Hayden, and D. Leung. Locking classical information. 2010, http:\/\/arxiv.org\/abs\/1011.1612arXiv:1011.1612."},{"key":"e_1_3_2_2_15_1","first-page":"123","volume-title":"Proc. Internat. Sympos. Linear Spaces","author":"Dvoretzky A.","year":"1961","unstructured":"A. Dvoretzky . Some results on convex bodies and Banach spaces . Proc. Internat. Sympos. Linear Spaces , pp. 123 -- 160 , 1961 . A. Dvoretzky. Some results on convex bodies and Banach spaces. Proc. Internat. Sympos. Linear Spaces, pp. 123--160, 1961."},{"key":"e_1_3_2_2_16_1","volume-title":"From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking","author":"Fawzi O.","year":"2010","unstructured":"O. Fawzi , P. Hayden , and P. Sen . From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking . 2010 , http:\/\/arxiv.org\/abs\/1010.3007arXiv:1010.3007. O. Fawzi, P. Hayden, and P. Sen. From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking. 2010, http:\/\/arxiv.org\/abs\/1010.3007arXiv:1010.3007."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02392234"},{"key":"e_1_3_2_2_18_1","volume-title":"Quantum Fingerprints that Keep Secrets","author":"Gavinsky D.","year":"2010","unstructured":"D. Gavinsky and T. Ito . Quantum Fingerprints that Keep Secrets . 2010 , http:\/\/arxiv.org\/abs\/1010.5342arXiv:1010.5342. D. Gavinsky and T. Ito. Quantum Fingerprints that Keep Secrets. 2010, http:\/\/arxiv.org\/abs\/1010.5342arXiv:1010.5342."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1373317"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1538902.1538904"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1857914.1857918"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1224"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-004-1087-6"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-008-0624-0"},{"key":"e_1_3_2_2_25_1","volume-title":"The fidelity alternative and quantum measurement simulation","author":"Hayden P.","year":"2010","unstructured":"P. Hayden and A. Winter . The fidelity alternative and quantum measurement simulation . 2010 , http:\/\/arxiv.org\/abs\/1003.4994arXiv:1003.4994. P. Hayden and A. Winter. The fidelity alternative and quantum measurement simulation. 2010, http:\/\/arxiv.org\/abs\/1003.4994arXiv:1003.4994."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250881"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.140502"},{"key":"e_1_3_2_2_29_1","volume-title":"Unconditional security from noisy quantum storage","author":"K\u00f6nig R.","year":"2009","unstructured":"R. K\u00f6nig , S. Wehner , and J. Wullschleger . Unconditional security from noisy quantum storage . 2009 , http:\/\/arxiv.org\/abs\/0906.1030arXiv:0906.1030. R. K\u00f6nig, S. Wehner, and J. Wullschleger. Unconditional security from noisy quantum storage. 2009, http:\/\/arxiv.org\/abs\/0906.1030arXiv:0906.1030."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/264772"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.60.1103"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01086740"},{"key":"e_1_3_2_2_33_1","series-title":"Lecture Notes in Mathematics 1200","volume-title":"Asymptotic theory of finite dimensional normed spaces","author":"Milman V. D.","year":"1986","unstructured":"V. D. Milman and G. Schechtman . Asymptotic theory of finite dimensional normed spaces . Lecture Notes in Mathematics 1200 . Springer-Verlag , 1986 . V. D. Milman and G. Schechtman. Asymptotic theory of finite dimensional normed spaces. Lecture Notes in Mathematics 1200. Springer-Verlag, 1986."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-008-9231-x"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.757013"},{"issue":"025009","key":"e_1_3_2_2_37_1","article-title":"Entropic uncertainty relations--a survey","volume":"12","author":"Wehner S.","year":"2010","unstructured":"S. Wehner and A. Winter . Entropic uncertainty relations--a survey . New Journal of Physics 12 : 025009 , 2010 , http:\/\/arxiv.org\/abs\/0907.3704arXiv:0907.3704. S. Wehner and A. Winter. Entropic uncertainty relations--a survey. New Journal of Physics 12:025009, 2010, http:\/\/arxiv.org\/abs\/0907.3704arXiv:0907.3704.","journal-title":"New Journal of Physics"},{"issue":"6","key":"e_1_3_2_2_38_1","first-page":"563","article-title":"Quantum and classical message identification via quantum channels","volume":"4","author":"Winter A.","year":"2004","unstructured":"A. Winter . Quantum and classical message identification via quantum channels . Quantum Inf. Comput. 4 ( 6&7 ): 563 -- 578 , 2004 , http:\/\/arxiv.org\/abs\/quant-ph\/0401060arXiv:quant-ph\/0401060. A. Winter. Quantum and classical message identification via quantum channels. Quantum Inf. Comput. 4(6&7):563--578, 2004, http:\/\/arxiv.org\/abs\/quant-ph\/0401060arXiv:quant-ph\/0401060.","journal-title":"Quantum Inf. Comput."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/0003-4916(89)90322-9"}],"event":{"name":"STOC'11: Symposium on Theory of Computing","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"San Jose California USA","acronym":"STOC'11"},"container-title":["Proceedings of the forty-third annual ACM symposium on Theory of computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993636.1993738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993636.1993738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:11Z","timestamp":1750244771000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993636.1993738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,6]]},"references-count":38,"alternative-id":["10.1145\/1993636.1993738","10.1145\/1993636"],"URL":"https:\/\/doi.org\/10.1145\/1993636.1993738","relation":{},"subject":[],"published":{"date-parts":[[2011,6,6]]},"assertion":[{"value":"2011-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}