Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Quantum oblivious transfer: a short review
Quantum cryptography is the field of cryptography that explores the quantum properties of
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
matter. Generally, it aims to develop primitives beyond the reach of classical cryptography …
Transmission estimation at the Cramér-Rao bound for squeezed states of light in the presence of loss and imperfect detection
TS Woodworth, KWC Chan, C Hermann-Avigliano… - Physical Review A, 2020 - APS
Enhancing the precision of a measurement requires maximizing the information that can be
gained about the quantity of interest from probing a system. For optical-based …
gained about the quantity of interest from probing a system. For optical-based …
Generation and distribution of quantum oblivious keys for secure multiparty computation
Featured Application Private data mining. Abstract The oblivious transfer primitive is
sufficient to implement secure multiparty computation. However, secure multiparty …
sufficient to implement secure multiparty computation. However, secure multiparty …
A new framework for quantum oblivious transfer
We present a new template for building oblivious transfer from quantum information that we
call the “fixed basis” framework. Our framework departs from prior work (eg, Crepeau and …
call the “fixed basis” framework. Our framework departs from prior work (eg, Crepeau and …
Performance of Practical Quantum Oblivious Key Distribution
Motivated by the applications of secure multiparty computation as a privacy-protecting data
analysis tool, and identifying oblivious transfer as one of its main practical enablers, we …
analysis tool, and identifying oblivious transfer as one of its main practical enablers, we …
Compact, low-threshold squeezed light source
Strongly squeezed light finds many important applications within the fields of quantum
metrology, quantum communication and quantum computation. However, due to the …
metrology, quantum communication and quantum computation. However, due to the …
Randomized oblivious transfer for secure multiparty computation in the quantum setting
Secure computation is a powerful cryptographic tool that encompasses the evaluation of any
multivariate function with arbitrary inputs from mutually distrusting parties. The oblivious …
multivariate function with arbitrary inputs from mutually distrusting parties. The oblivious …
Private computation of phylogenetic trees based on quantum technologies
Individuals' privacy and legal regulations demand genomic data be handled and studied
with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure …
with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure …
Optimal realistic attacks in continuous-variable quantum key distribution
Quantum cryptographic protocols are typically analyzed by assuming that potential
opponents can carry out all physical operations, an assumption which grants capabilities far …
opponents can carry out all physical operations, an assumption which grants capabilities far …