Distilling common randomness from bipartite quantum states
Igor Devetak, Andreas Winter
ISIT 2003
We analyze the security of an interactive identification scheme. The scheme is the obvious extension of the original square root scheme of Goldwasser, Micali, and Rackoff to 2mth roots. This scheme is quite practical, especially in terms of storage and communication complexity. Although this scheme is certainly not new, its security was apparently not fully understood. We prove that this scheme is secure if factoring integers is hard, even against active attacks where the adversary is first allowed to pose as a verifier before attempting impersonation. © 1999 International Association for Cryplologic Research.
Igor Devetak, Andreas Winter
ISIT 2003
Martin Charles Golumbic, Renu C. Laskar
Discrete Applied Mathematics
W.F. Cody, H.M. Gladney, et al.
SPIE Medical Imaging 1994
Frank R. Libsch, Takatoshi Tsujimura
Active Matrix Liquid Crystal Displays Technology and Applications 1997