Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Entropic uncertainty relations and their applications
Heisenberg's uncertainty principle forms a fundamental element of quantum mechanics.
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …
[LIVRE][B] Quantum information processing with finite resources: mathematical foundations
M Tomamichel - 2015 - books.google.com
This book provides the reader with the mathematical framework required to fully explore the
potential of small quantum information processing devices. As decoherence will continue to …
potential of small quantum information processing devices. As decoherence will continue to …
Random oracles in a quantum world
The interest in post-quantum cryptography—classical systems that remain secure in the
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
A framework for non-asymptotic quantum information theory
M Tomamichel - arxiv preprint arxiv:1203.2142, 2012 - arxiv.org
This thesis consolidates, improves and extends the smooth entropy framework for non-
asymptotic information theory and cryptography. We investigate the conditional min-and max …
asymptotic information theory and cryptography. We investigate the conditional min-and max …
Secure identity-based encryption in the quantum random oracle model
M Zhandry - International Journal of Quantum Information, 2015 - World Scientific
We give the first proof of security for an identity-based encryption (IBE) scheme in the
quantum random oracle model. This is the first proof of security for any scheme in this model …
quantum random oracle model. This is the first proof of security for any scheme in this model …
Secure signatures and chosen ciphertext security in a quantum computing world
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model …
security. In the case of signatures, we enhance the standard chosen message query model …
Computationally binding quantum commitments
D Unruh - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We present a new definition of computationally binding commitment schemes in the
quantum setting, which we call “collapse-binding”. The definition applies to string …
quantum setting, which we call “collapse-binding”. The definition applies to string …
Oblivious transfer is in MiniQCrypt
MiniQCrypt is a world where quantum-secure one-way functions exist, and quantum
communication is possible. We construct an oblivious transfer (OT) protocol in MiniQCrypt …
communication is possible. We construct an oblivious transfer (OT) protocol in MiniQCrypt …