Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions

V Vasani, K Prateek, R Amin, S Maity… - Journal of Industrial …, 2024 - Elsevier
The continuous technological revolution, driven by transformative innovations such as
artificial intelligence, blockchain, and Internet of Things, has left an everlasting mark on the …

Private quantum computation: an introduction to blind quantum computing and related protocols

JF Fitzsimons - npj Quantum Information, 2017 - nature.com
Quantum technologies hold the promise of not only faster algorithmic processing of data, via
quantum computation, but also of more secure communications, in the form of quantum …

Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

Verification of quantum computation: An overview of existing approaches

A Gheorghiu, T Kapourniotis, E Kashefi - Theory of computing systems, 2019 - Springer
Quantum computers promise to efficiently solve not only problems believed to be intractable
for classical computers, but also problems for which verifying the solution is also considered …

Unconditionally verifiable blind quantum computation

JF Fitzsimons, E Kashefi - Physical Review A, 2017 - APS
Blind quantum computing (BQC) allows a client to have a server carry out a quantum
computation for them such that the client's input, output, and computation remain private. A …

Verifiable measurement-only blind quantum computing with stabilizer testing

M Hayashi, T Morimae - Physical review letters, 2015 - APS
We introduce a simple protocol for verifiable measurement-only blind quantum computing.
Alice, a client, can perform only single-qubit measurements, whereas Bob, a server, can …

Quantum homomorphic encryption for circuits of low T-gate complexity

A Broadbent, S Jeffery - Annual Cryptology Conference, 2015 - Springer
Fully homomorphic encryption is an encryption method with the property that any
computation on the plaintext can be performed by a party having access to the ciphertext …

Quantum computing on encrypted data

KAG Fisher, A Broadbent, LK Shalm, Z Yan… - Nature …, 2014 - nature.com
The ability to perform computations on encrypted data is a powerful tool for protecting
privacy. Recently, protocols to achieve this on classical computing systems have been …

Quantum homomorphic encryption for polynomial-sized circuits

Y Dulek, C Schaffner, F Speelman - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
We present a new scheme for quantum homomorphic encryption which is compact and
allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the …