Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

[HTML][HTML] Using quantum key distribution for cryptographic purposes: A survey

R Alléaume, C Branciard, J Bouda… - Theoretical Computer …, 2014 - Elsevier
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is
the ability to prove the information-theoretic security (ITS) of the established keys. As a key …

[КНИГА][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

[КНИГА][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

Algebraic cryptanalysis of hidden field equation (HFE) cryptosystems using Gröbner bases

JC Faugere, A Joux - Annual International Cryptology Conference, 2003 - Springer
In this paper, we review and explain the existing algebraic cryptanalysis of multivariate
cryptosystems from the hidden field equation (HFE) family. These cryptanalysis break …

Robust key generation from signal envelopes in wireless networks

B Azimi-Sadjadi, A Kiayias, A Mercado… - Proceedings of the 14th …, 2007 - dl.acm.org
The broadcast nature of a wireless link provides a natural eavesdrop** and intervention
capability to an adversary. Thus, securing a wireless link is essential to the security of a …

Entropy measures and unconditional security in cryptography

C Cachin - 1997 - research-collection.ethz.ch
One of the most important properties of a cryptographic system is a proof of its security. In the
present work, information-theoretic meth¬ ods are used for proving the security of …

Revocable quantum timed-release encryption

D Unruh - Journal of the ACM (JACM), 2015 - dl.acm.org
Timed-release encryption is a kind of encryption scheme in which a recipient can decrypt
only after a specified amount of time T (assuming that we have a moderately precise …

[КНИГА][B] Modern cryptography, probabilistic proofs and pseudorandomness

O Goldreich - 1998 - books.google.com
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The
interplay between randomness and computation is one of the most fas cinating scientific …

Position based cryptography

N Chandran, V Goyal, R Moriarty… - Annual International …, 2009 - Springer
We consider what constitutes identities in cryptography. Typical examples include your
name and your social-security number, or your fingerprint/iris-scan, or your address, or your …