Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Quantum oblivious transfer: a short review
Quantum cryptography is the field of cryptography that explores the quantum properties of
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
Embedding cyclic causal structures in acyclic spacetimes: no-go results for process matrices
V Vilasini, R Renner - ar** indefinite causal order processes to composable quantum protocols in a spacetime
M Salzger, V Vilasini - New Journal of Physics, 2024 - iopscience.iop.org
Formalisms for higher order quantum processes provide a theoretical formalisation of
quantum processes where the order of agents' operations need not be definite and acyclic …
quantum processes where the order of agents' operations need not be definite and acyclic …
A device-independent protocol for XOR oblivious transfer
Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to
learn some function of them. Ideally, Alice should not learn Bob's desired function choice …
learn some function of them. Ideally, Alice should not learn Bob's desired function choice …
Introduction to gravitational redshift of quantum photons propagating in curved spacetime
LAA Rodríguez, AW Schell… - Journal of Physics …, 2023 - iopscience.iop.org
Gravitational redshift is discussed in the context of quantum photons propagating in curved
spacetime. A brief introduction to modelling realistic photons is first presented and the effect …
spacetime. A brief introduction to modelling realistic photons is first presented and the effect …
[PDF][PDF] Categorical composable cryptography.
A Broadbent, M Karvonen - FoSSaCS, 2022 - library.oapen.org
We formalize the simulation paradigm of cryptography in terms of category theory and show
that protocols secure against abstract attacks form a symmetric monoidal category, thus …
that protocols secure against abstract attacks form a symmetric monoidal category, thus …
Categorical composable cryptography: extended version
A Broadbent, M Karvonen - Logical Methods in Computer …, 2024 - lmcs.episciences.org
We formalize the simulation paradigm of cryptography in terms of category theory and show
that protocols secure against abstract attacks form a symmetric monoidal category, thus …
that protocols secure against abstract attacks form a symmetric monoidal category, thus …
A decompositional framework for process theories in spacetime
There has been a recent surge in interest in quantum foundations coming from incorporating
ideas from general relativity and quantum gravity. In particular, the field of indefinite causal …
ideas from general relativity and quantum gravity. In particular, the field of indefinite causal …