{"id":"https://openalex.org/W2976146734","doi":"https://doi.org/10.1109/isit.2019.8849408","title":"Interactive Leakage Chain Rule for Quantum Min-entropy","display_name":"Interactive Leakage Chain Rule for Quantum Min-entropy","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2976146734","doi":"https://doi.org/10.1109/isit.2019.8849408","mag":"2976146734"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2019.8849408","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2019.8849408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016730083","display_name":"Ching\u2013Yi Lai","orcid":"https://orcid.org/0000-0003-1970-8167"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ching-Yi Lai","raw_affiliation_strings":["Institute of Communications Engineering, National Chiao Tung University, Hsinchu, 30010, Taiwan","Institute of Communications Engineering, National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Chiao Tung University, Hsinchu, 30010, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"Institute of Communications Engineering, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100679596","display_name":"Kai-Min Chung","orcid":"https://orcid.org/0000-0002-3356-369X"},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kai-Min Chung","raw_affiliation_strings":["Institute of Information Science, Academia Sinica, Taipei, 11529, Taiwan","Institute of Information Science, Academia Sinica, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science, Academia Sinica, Taipei, 11529, Taiwan","institution_ids":["https://openalex.org/I4210098366"]},{"raw_affiliation_string":"Institute of Information Science, Academia Sinica, Taipei, Taiwan","institution_ids":["https://openalex.org/I4210098366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016730083"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":0.1447,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58527093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2997","last_page":"3001"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6085638403892517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.581617534160614},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.5272749066352844},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5107822418212891},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4814743101596832},{"id":"https://openalex.org/keywords/statistical-physics","display_name":"Statistical physics","score":0.4351058006286621},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38718289136886597},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3242015838623047},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.2449539303779602},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.23326584696769714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1450667381286621}],"concepts":[{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6085638403892517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.581617534160614},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.5272749066352844},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5107822418212891},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4814743101596832},{"id":"https://openalex.org/C121864883","wikidata":"https://www.wikidata.org/wiki/Q677916","display_name":"Statistical physics","level":1,"score":0.4351058006286621},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38718289136886597},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3242015838623047},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.2449539303779602},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.23326584696769714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1450667381286621},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2019.8849408","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2019.8849408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1508636262","https://openalex.org/W1527980406","https://openalex.org/W1621050367","https://openalex.org/W1969016943","https://openalex.org/W1972412225","https://openalex.org/W1976183756","https://openalex.org/W1993661095","https://openalex.org/W2020725861","https://openalex.org/W2054838374","https://openalex.org/W2094133109","https://openalex.org/W2106654982","https://openalex.org/W2133701468","https://openalex.org/W2143940675","https://openalex.org/W2160083149","https://openalex.org/W2164253138","https://openalex.org/W2167346196","https://openalex.org/W2608609636","https://openalex.org/W2917153147","https://openalex.org/W3037776276","https://openalex.org/W3103473269","https://openalex.org/W3105857502","https://openalex.org/W4235974186","https://openalex.org/W4285719527","https://openalex.org/W6683357420","https://openalex.org/W6736716549"],"related_works":["https://openalex.org/W3156288925","https://openalex.org/W2385771124","https://openalex.org/W2012047566","https://openalex.org/W3123987581","https://openalex.org/W2358406440","https://openalex.org/W2352435628","https://openalex.org/W3096760981","https://openalex.org/W151758239","https://openalex.org/W3175365978","https://openalex.org/W3011894940"],"abstract_inverted_index":{"The":[0],"leakage":[1,17],"chain":[2],"rule":[3],"for":[4],"quantum":[5,65],"min-entropy":[6,11,33],"quantifies":[7,29],"the":[8,19,30,62],"change":[9,31],"of":[10,32,58,64,67],"when":[12],"one":[13],"party":[14],"gets":[15],"additional":[16],"about":[18],"information":[20],"source.":[21],"Herein":[22],"we":[23,54],"provide":[24],"an":[25,39,52],"interactive":[26],"version":[27],"that":[28],"between":[34],"two":[35],"parties,":[36],"who":[37],"share":[38],"initial":[40],"classical-quantum":[41],"state":[42],"and":[43],"are":[44],"allowed":[45],"to":[46],"run":[47],"a":[48],"two-party":[49],"protocol.":[50],"As":[51],"application,":[53],"prove":[55],"new":[56],"versions":[57],"lower":[59],"bounds":[60],"on":[61],"complexity":[63],"communication":[66],"classical":[68],"information.":[69]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
