Criteria of key security
Matematičeskie voprosy kriptografii, Tome 7 (2016) no. 1, pp. 39-56 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

We formalize the notion of practical security of the encryption scheme introduced by C. Shannon as “the average amount of work to determine the key...” and define the corresponding practical security of key criterion. A comparison of the proposed criterion with the entropy criterion and the total variance criterion used in the quantum cryptography is given.
@article{MVK_2016_7_1_a1,
     author = {I. M. Arbekov},
     title = {Criteria of key security},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {39--56},
     year = {2016},
     volume = {7},
     number = {1},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MVK_2016_7_1_a1/}
}
TY  - JOUR
AU  - I. M. Arbekov
TI  - Criteria of key security
JO  - Matematičeskie voprosy kriptografii
PY  - 2016
SP  - 39
EP  - 56
VL  - 7
IS  - 1
UR  - http://geodesic.mathdoc.fr/item/MVK_2016_7_1_a1/
LA  - ru
ID  - MVK_2016_7_1_a1
ER  - 
%0 Journal Article
%A I. M. Arbekov
%T Criteria of key security
%J Matematičeskie voprosy kriptografii
%D 2016
%P 39-56
%V 7
%N 1
%U http://geodesic.mathdoc.fr/item/MVK_2016_7_1_a1/
%G ru
%F MVK_2016_7_1_a1
I. M. Arbekov. Criteria of key security. Matematičeskie voprosy kriptografii, Tome 7 (2016) no. 1, pp. 39-56. http://geodesic.mathdoc.fr/item/MVK_2016_7_1_a1/

[1] Bennett C. H., Brassard G., “Quantum cryptography: public key distribution and coin tossing”, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (Bangalore, India, December 9–12, 1984), Indian Inst. Sci., Bangalore, 1984, 175–179

[2] Inarmori H., Lütkenhaus N., Mayers D., “Unconditional security of practical quantum key distribution”, Eur. Phys. J., Ser. D, 41:33 (2007), 599–627 | DOI

[3] Timofeev A. V., Pomozov D. I., Makkaveev A. P., Molotkov S. N., “O strukture otkrytogo klassicheskogo kanala svyazi v kvantovoi kriptografii: korrektsiya oshibok, tselostnost i autentichnost”, ZhETF, 131:5 (2007), 771–789

[4] Bennett C. H., Brassard G., Crepeau C., Maurer U. M., “Generalized privacy amplification”, IEEE Trans. Inform. Theory, IT-41:6/2 (1995), 1915–1923 | DOI | MR | Zbl

[5] Tomamichel M., Lim C. C. W., Gizin N., Renner R., “Tight finite-key analysis for quantum cryptography”, Nature Comm., 3:634, December (2012), 6 | DOI

[6] Dodis Y., Ostrovsky R., Reyzin L., Smith A., “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data”, SIAM J. Comput., 38:1 (2008), 97–139 | DOI | MR | Zbl

[7] Scarani V., Renner R., Security bounds for quantum cryptography with finite resourses, 2008, arXiv: 0806.0120 | MR

[8] Chistandl M., Renner R., Ekert A., A generic security proof for quantum key distribution, 2004, arXiv: quant-ph/0402131

[9] Renes J. M., Renner R., Noisy channel coding via privacy amplification and information reconciliation, 2012, arXiv: 1012.4814 | MR

[10] Yuen H. P., Fundamental quantitative security in quantum key generation, 2010, arXiv: 1008.0623v2

[11] Yuen H. P., Problems of exiting unconditional security proofs in quantum key distribution, 2011, arXiv: 1109.1051

[12] Yuen H. P., Fundamental and practical problems of QKD security — the actual and the perceived situation, 2012, arXiv: 1109.1066

[13] Yuen H. P., Unconditional security in quantum key distribution, 2012, arXiv: 1205.5065

[14] Yuen H. P., Incompleteness and limit of quantum key distribution theory, 2012, arXiv: 1208.2106

[15] Renner R., Reply to recent scepticism about the foundations of quantum cryptography, 2012, arXiv: 1209.2423

[16] Yuen H. P., On the foundations of quantum key distribution — reply to Renner and beyond, 2012, arXiv: 1210.2804

[17] Hirota O., Misconception in theory of quantum key distribution — reply to Renner, 2013, arXiv: 1306.1277

[18] Yuen H. P., Essential lack of security in quantum key distribution, 2013, arXiv: 1310.0842

[19] Yuen H. P., Can quantum key distribution be secure, 2014, arXiv: 1405.0457 | MR

[20] Hirota O., A correct security evaluation of quantum key distribution, 2014, arXiv: 1409.5991

[21] Shennon K., Raboty po teorii informatsii i kibernetike, IL, M., 1963, 832 pp.

[22] Khardi G. G., Littlvud Dzh. E., Polia G., Neravenstva, Per. s angl. V. I. Levina, IL, M., 1948, 456 pp. | MR

[23] Feller V., Vvedenie v teoriyu veroyatnostei, per. s angl. Yu. V. Prokhorova, Mir, M., 1984, 528 pp.

[24] Fomichev V. M., Diskretnaya matematika i kriptologiya, ed. N. D. Podufalov, Dialog-MIFI, M., 2003, 400 pp.