Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

A pragmatic introduction to secure multi-party computation

D Evans, V Kolesnikov, M Rosulek - Foundations and Trends® …, 2018 - nowpublishers.com
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

Security of quantum key distribution

R Renner - International Journal of Quantum Information, 2008 - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …

An efficient system for non-transferable anonymous credentials with optional anonymity revocation

J Camenisch, A Lysyanskaya - … Conference on the Theory and Application …, 2001 - Springer
A credential system is a system in which users can obtain credentials from organizations
and demonstrate possession of these credentials. Such a system is anonymous when …

Dynamic accumulators and application to efficient revocation of anonymous credentials

J Camenisch, A Lysyanskaya - … Santa Barbara, California, USA, August 18 …, 2002 - Springer
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …

Direct anonymous attestation

E Brickell, J Camenisch, L Chen - … of the 11th ACM conference on …, 2004 - dl.acm.org
This paper describes the direct anonymous attestation scheme (DAA). This scheme was
adopted by the Trusted Computing Group (TCG) as the method for remote authentication of …

Expander flows, geometric embeddings and graph partitioning

S Arora, S Rao, U Vazirani - Journal of the ACM (JACM), 2009 - dl.acm.org
We give a O (√ log n)-approximation algorithm for the sparsest cut, edge expansion,
balanced separator, and graph conductance problems. This improves the O (log n) …

Universally composable two-party and multi-party secure computation

R Canetti, Y Lindell, R Ostrovsky, A Sahai - Proceedings of the thiry …, 2002 - dl.acm.org
We show how to securely realize any multi-party functionality in a universally composable
way, regardless of the number of corrupted participants. That is, we consider a multi-party …