Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

Quantum computational complexity

J Watrous - arxiv preprint arxiv:0804.3401, 2008 - arxiv.org
This article surveys quantum computational complexity, with a focus on three fundamental
notions: polynomial-time quantum computations, the efficient verification of quantum proofs …

Random oracles in a quantum world

D Boneh, Ö Dagdelen, M Fischlin, A Lehmann… - Advances in Cryptology …, 2011 - Springer
The interest in post-quantum cryptography—classical systems that remain secure in the
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …

[BOOK][B] Quantum computing: A gentle introduction

EG Rieffel, WH Polak - 2011 - books.google.com
A thorough exposition of quantum computing and the underlying concepts of quantum
physics, with explanations of the relevant mathematics and numerous examples. The …

Exponential improvement in precision for simulating sparse Hamiltonians

DW Berry, AM Childs, R Cleve, R Kothari… - Proceedings of the forty …, 2014 - dl.acm.org
We provide a quantum algorithm for simulating the dynamics of sparse Hamiltonians with
complexity sublogarithmic in the inverse error, an exponential improvement over previous …

Quantum computation vs. firewalls

D Harlow, P Hayden - Journal of High Energy Physics, 2013 - Springer
A bstract In this paper we discuss quantum computational restrictions on the types of thought
experiments recently used by Almheiri, Marolf, Polchinski, and Sully to argue against the …

System and methods to compensate for Doppler effects in multi-user (MU) multiple antenna systems (MAS)

A Forenza, SG Perlman - US Patent 9,312,929, 2016 - Google Patents
H04B7/0615—Diversity systems; Multi-antenna system, ie transmission or reception using
multiple antennas using two or more spaced independent antennas at the transmitting …

Quantum Security of NMAC and Related Constructions: PRF Domain Extension Against Quantum attacks

F Song, A Yun - Advances in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed
input-length as quantum-secure pseudo-random functions (PRFs). Namely, they are …

Revisiting post-quantum fiat-shamir

Q Liu, M Zhandry - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
Abstract The Fiat-Shamir transformation is a useful approach to building non-interactive
arguments (of knowledge) in the random oracle model. Unfortunately, existing proof …

Non-interactive zero-knowledge proofs in the quantum random oracle model

D Unruh - Advances in Cryptology-EUROCRYPT 2015: 34th …, 2015 - Springer
We present a construction for non-interactive zero-knowledge proofs of knowledge in the
random oracle model from general sigma-protocols. Our construction is secure against …