Filters








15,532 Hits in 2.2 sec

Generalized privacy amplification

C.H. Bennett, G. Brassard, C. Crepeau, U.M. Maurer
1995 IEEE Transactions on Information Theory  
This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario.  ...  Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which an eavesdropper has partial information.  ...  Wootters for stimulating discussions on privacy amplification, and an anonymous referee for many helpful comments.  ... 
doi:10.1109/18.476316 fatcat:wjbrqdvkyzbyvaxc6mc6vwfmua

Memory-Saving and High-Speed Privacy Amplification Algorithm Using LFSR-Based Hash Function for Key Generation

Enjian Bai, Xue-qin Jiang, Yun Wu
2022 Electronics  
Privacy amplification is an indispensable procedure for key generation in the quantum key distribution system and the physical layer key distribution system.  ...  In this paper, we propose a high-speed privacy amplification algorithm that saves hardware memory and improves the key randomness performance.  ...  Conclusions In this paper, we proposed a privacy amplification algorithm for key distribution.  ... 
doi:10.3390/electronics11030377 fatcat:rjjrggjahnhffdhmgy2pgddh2i

Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

Yu-Guang Yang, Peng Xu, Rui Yang, Yi-Hua Zhou, Wei-Min Shi
2016 Scientific Reports  
Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption  ...  It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security.  ...  QKD generally contains three steps: (1) raw key sifting, (2) error reconciliation, and (3) privacy amplification.  ... 
doi:10.1038/srep19788 pmid:26823196 pmcid:PMC4731770 fatcat:vr5j4horlrazvlu5xxowdynvua

Generalized privacy amplification

C.H. Bennett, G. Brassard, C. Crepeau, U.M. Maurer
Proceedings of 1994 IEEE International Symposium on Information Theory  
This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario.  ...  Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which an eavesdropper has partial information.  ...  Wootters for stimulating discussions on privacy amplification, and an anonymous referee for many helpful comments.  ... 
doi:10.1109/isit.1994.394668 fatcat:gfwkynmryrbetmguleyq7sng6q

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution [chapter]

Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Wanrong Yu, Ilsun You
2013 Lecture Notes in Computer Science  
In this paper, we propose the real-time privacy amplification (RTPA) scheme which converts the weak secret string W to a uniform key that is fully secret from Eve.  ...  Privac amplification is a very significant procedure in QKD system.  ...  Experimental results show the efficiency of our proposed RTPA scheme for generating unconditional security keys in quantum cryptography. 2 The Proposed RTPA Scheme Privacy Amplification Protocol After  ... 
doi:10.1007/978-3-642-36818-9_50 fatcat:7m73byarwvgszlujshr2ttynda

High-Speed Implementation of Length-Compatible Privacy Amplification in Continuous-Variable Quantum Key Distribution

Xiangyu Wang, Yichen Zhang, Song Yu, Hong Guo
2018 IEEE Photonics Journal  
CV-QKD system and ensures the security of privacy amplification.  ...  The processing speed of privacy amplification has a significant effect on the secret key rate of CV-QKD system.  ...  Generally, the second part is the postprocessing of CV-QKD systems, which mainly contains sifting, parameter estimation [13] , [14] , information reconciliation [15] - [17] and privacy amplification  ... 
doi:10.1109/jphot.2018.2824316 fatcat:soblcgjwpfh6tdcozmcozcefiq

Stream privacy amplification for quantum cryptography [article]

Yizhi Huang, Xingjian Zhang, Xiongfeng Ma
2021 arXiv   pre-print
This is similar to block ciphers in classical cryptography that would delay the final key generation since an entire block must be accumulated before privacy amplification.  ...  Privacy amplification is the key step to guarantee the security of quantum communication. The existing security proofs require accumulating a large number of raw key bits for privacy amplification.  ...  In order to make privacy amplification efficient, Alice and Bob can employ a large data size without causing delays in real-time key generation.  ... 
arXiv:2111.14108v1 fatcat:5vp4swyrxvenplezaz4sur42fy

FLAME: Differentially Private Federated Learning in the Shuffle Model [article]

Ruixuan Liu, Yang Cao, Hong Chen, Ruoyang Guo, Masatoshi Yoshikawa
2021 arXiv   pre-print
We also provide theoretical analysis and numerical evaluations of the privacy amplification of the proposed protocols.  ...  To solve this challenge, we propose an enhanced protocol (SS-Double) to increase the privacy amplification effect by subsampling.  ...  effect for generic randomizer is distilled in Corollary 1.  ... 
arXiv:2009.08063v4 fatcat:efo6ygwda5amxgxea73vo7hsey

Memory-Saving Implementation of High-Speed Privacy Amplification Algorithm for Continuous-Variable Quantum Key Distribution

Dengwen Li, Peng Huang, Yingming Zhou, Yuan Li, Guihua Zeng
2018 IEEE Photonics Journal  
Here, we propose a novel privacy amplification scheme with an optimal hash function.  ...  In this way, the LFSR-based Toeplitz matrix is used to execute the privacy amplification algorithm.  ...  One is privacy amplification algorithm of Toeplitz matrix based on LFSR and the other is privacy amplification algorithm of general Toeplitz Matrix.  ... 
doi:10.1109/jphot.2018.2865486 fatcat:gudlcgvfkjdotfmx7fiieqijnq

Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences [article]

Borja Balle and Gilles Barthe and Marco Gaboardi
2018 arXiv   pre-print
In this paper we present a general method that recovers and improves prior analyses, yields lower bounds and derives new instances of privacy amplification by subsampling.  ...  One important tool is the so-called "privacy amplification by subsampling" principle, which ensures that a differentially private mechanism run on a random subsample of a population provides higher privacy  ...  Conclusions We have developed a general method for reasoning about privacy amplification by subsampling.  ... 
arXiv:1807.01647v2 fatcat:cx5ov4b5ifgc3mif7p77w6uvaq

Face-Off: Adversarial Face Obfuscation [article]

Varun Chandrasekaran, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha, Suman Banerjee
2020 arXiv   pre-print
Existing approaches to mitigate these privacy risks from unwanted face recognition result in an imbalanced privacy-utility trade-off to users.  ...  While useful to social media platforms and users, this technology carries significant privacy threats.  ...  In addition, amplification offers users the flexibility to balance the privacy-utility trade-off; privacy-conscious users can increase amplification and obtain greater privacy, at the expense of more visible  ... 
arXiv:2003.08861v2 fatcat:m5q3gdbjyvgprioef5ozh5noku

The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms [article]

Mingxun Zhou, Elaine Shi
2022 IACR Cryptology ePrint Archive  
In this paper, we prove an optimal privacy amplification theorem by composing any locally differentially private (LDP) mechanism with a DO-shuffler, achieving parameters that tightly match the shuffle  ...  The shuffle model has been extensively investigated in the distributed differential privacy (DP) literature.  ...  Theorem 7 (Optimal privacy amplification of general LDP randomizers by a DO shuffler).  ... 
dblp:journals/iacr/ZhouS22 fatcat:c37m3g5b2ze3dgdo2he6krumym

Privacy amplification scheme based on composite coding [article]

Wei Li, Shengmei Zhao
2021 arXiv   pre-print
The commonly used privacy amplification is based on the random selection of universal hash functions, which needs the help of an additional random source, while it does not exist in general.  ...  In this paper, we propose a privacy amplification scheme based on composite coding, which is an extension of quantum CSS codes to classical linear codes.  ...  In addition, the collision probability and Rényi entropy are commonly introduced in the privacy amplification process to quantify the randomness generated by universal hashing [5, 27, 28] .  ... 
arXiv:2109.07139v1 fatcat:v3fwke6opfe6vbii3wbuk5ulma

Cryptanalysis of a Practical Quantum Key Distribution With Polarization-Entangled Photons [article]

Thomas Beth and Joern Mueller-Quade and Rainer Steinwandt
2004 arXiv   pre-print
Note that the only part of the protocol-log extract influenced by the privacy amplification matrix are the last 128 bits of the jointly generated key; the privacy amplification matrix itself is not explicitly  ...  Including the privacy amplification matrix into the protocol-log extract From the above discussion it may be tempting to conclude that including the complete privacy amplification matrix into the protocol-log  ... 
arXiv:quant-ph/0407130v1 fatcat:vvai57jmjrctpg6oynhobcxyt4

Quantum privacy amplification for quantum secure direct communication [article]

Fu-Guo Deng, Gui Lu Long
2004 arXiv   pre-print
Over a noisy quantum channel, quantum privacy amplification is a necessary step to ensure the security of the message.  ...  In this paper, we present a quantum privacy amplification scheme for quantum secure direct communication using single photons.  ...  To allow the scheme to be operable over a noisy channel, quantum privacy amplification has to be used. In this paper, we present a quantum privacy amplification scheme for QSDC (QSDC-QPA).  ... 
arXiv:quant-ph/0408102v1 fatcat:5m77u2srwjdybhekgsz46ic5de
« Previous Showing results 1 — 15 out of 15,532 results