Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Universally composable security: A new paradigm for cryptographic protocols
R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
Security of quantum key distribution
R Renner - International Journal of Quantum Information, 2008 - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
A credential system is a system in which users can obtain credentials from organizations
and demonstrate possession of these credentials. Such a system is anonymous when …
and demonstrate possession of these credentials. Such a system is anonymous when …
Dynamic accumulators and application to efficient revocation of anonymous credentials
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …
hash a large set of inputs into one short value, such that there is a short proof that a given …
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was
adopted by the Trusted Computing Group (TCG) as the method for remote authentication of …
adopted by the Trusted Computing Group (TCG) as the method for remote authentication of …
Expander flows, geometric embeddings and graph partitioning
We give a O (√ log n)-approximation algorithm for the sparsest cut, edge expansion,
balanced separator, and graph conductance problems. This improves the O (log n) …
balanced separator, and graph conductance problems. This improves the O (log n) …
Universally composable two-party and multi-party secure computation
We show how to securely realize any multi-party functionality in a universally composable
way, regardless of the number of corrupted participants. That is, we consider a multi-party …
way, regardless of the number of corrupted participants. That is, we consider a multi-party …