scispace - formally typeset
Open AccessJournal ArticleDOI

More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function

TLDR
This work explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$ .
Abstract
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$ . The key idea is the concept of dual universal2 hash function introduced recently. We also use a new method for constructing extractors by concatenating $\delta $ -almost dual universal2 hash functions with other extractors. Besides minimizing seed lengths, we also introduce methods that allow one to use non-uniform random seeds for extractors. These methods can be applied to a wide class of extractors, including dual universal2 hash function, as well as to the conventional universal2 hash functions.

read more

Citations
More filters
Journal ArticleDOI

Wavelength division multiplexing of continuous variable quantum key distribution and 18.3 Tbit/s data channels

TL;DR: Experimental verification of QKD co-propagating with a large number of wavelength division multiplexing (WDM) coherent data channels is presented, demonstrating more than a factor of 10 increase in the number of WDM channels and more than 90 times higher classical bitrate.
Journal ArticleDOI

Secure Multiplex Coding With Dependent and Non-Uniform Multiple Messages

TL;DR: In the previous researches, multiple secret messages were assumed to have independent and uniform distributions, which is difficult to be ensured in practice, so this generalization of the channel resolvability technique is removed.
Journal ArticleDOI

Quantum key distribution with entangled photons generated on demand by a quantum dot.

TL;DR: In this article, a coherently driven quantum dot was used to experimentally demonstrate a modified Ekert quantum key distribution protocol with two quantum channel approaches: both a 250m-long singlemode fiber and in free space, connecting two buildings within the campus of Sapienza University in Rome.
Journal ArticleDOI

Implementation of continuous-variable quantum key distribution with discrete modulation

TL;DR: The CV-QKD system utilises a four-state and post-selection protocol and generates a secure key against the entangling cloner attack, and uses a non-binary LDPC code for error correction and the Toeplitz matrix multiplication for privacy amplification.
Journal ArticleDOI

Universal Hashing for Information-Theoretic Security

TL;DR: A special class of practical schemes for information-theoretic security that are based on 2-universal hash families based on secret key agreement and wiretap coding are reviewed, and general themes are identified.
References
More filters
Journal ArticleDOI

Universal classes of hash functions

TL;DR: An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.
Journal ArticleDOI

A Pseudorandom Generator from any One-way Function

TL;DR: It is shown how to construct a pseudorandom generator from any one-way function, and it is shown that there is a Pseudorandom Generator if and only ifthere is a one- way function.
Journal ArticleDOI

New hash functions and their use in authentication and set equality

TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Journal ArticleDOI

Generalized privacy amplification

TL;DR: This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.