Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
Quantum computational complexity
J Watrous - arxiv preprint arxiv:0804.3401, 2008 - arxiv.org
This article surveys quantum computational complexity, with a focus on three fundamental
notions: polynomial-time quantum computations, the efficient verification of quantum proofs …
notions: polynomial-time quantum computations, the efficient verification of quantum proofs …
Random oracles in a quantum world
The interest in post-quantum cryptography—classical systems that remain secure in the
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
[BOOK][B] Quantum computing: A gentle introduction
EG Rieffel, WH Polak - 2011 - books.google.com
A thorough exposition of quantum computing and the underlying concepts of quantum
physics, with explanations of the relevant mathematics and numerous examples. The …
physics, with explanations of the relevant mathematics and numerous examples. The …
Exponential improvement in precision for simulating sparse Hamiltonians
We provide a quantum algorithm for simulating the dynamics of sparse Hamiltonians with
complexity sublogarithmic in the inverse error, an exponential improvement over previous …
complexity sublogarithmic in the inverse error, an exponential improvement over previous …
Quantum computation vs. firewalls
A bstract In this paper we discuss quantum computational restrictions on the types of thought
experiments recently used by Almheiri, Marolf, Polchinski, and Sully to argue against the …
experiments recently used by Almheiri, Marolf, Polchinski, and Sully to argue against the …
System and methods to compensate for Doppler effects in multi-user (MU) multiple antenna systems (MAS)
A Forenza, SG Perlman - US Patent 9,312,929, 2016 - Google Patents
H04B7/0615—Diversity systems; Multi-antenna system, ie transmission or reception using
multiple antennas using two or more spaced independent antennas at the transmitting …
multiple antennas using two or more spaced independent antennas at the transmitting …
Quantum Security of NMAC and Related Constructions: PRF Domain Extension Against Quantum attacks
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed
input-length as quantum-secure pseudo-random functions (PRFs). Namely, they are …
input-length as quantum-secure pseudo-random functions (PRFs). Namely, they are …
Revisiting post-quantum fiat-shamir
Abstract The Fiat-Shamir transformation is a useful approach to building non-interactive
arguments (of knowledge) in the random oracle model. Unfortunately, existing proof …
arguments (of knowledge) in the random oracle model. Unfortunately, existing proof …
Non-interactive zero-knowledge proofs in the quantum random oracle model
D Unruh - Advances in Cryptology-EUROCRYPT 2015: 34th …, 2015 - Springer
We present a construction for non-interactive zero-knowledge proofs of knowledge in the
random oracle model from general sigma-protocols. Our construction is secure against …
random oracle model from general sigma-protocols. Our construction is secure against …