Quantum Setting with Applications
|
|
- Austen Jacobs
- 5 years ago
- Views:
Transcription
1 in the Quantum Setting with Applications Frédéric Dupuis 1 Serge Fehr 2 Philippe Lamontagne 3 Louis Salvail 3 2 CWI, Amsterdam, The Netherlands 1 Faculty of Informatics, Masaryk University, Brno, Czech Republic 3 Université de Montréal (DIRO), Montréal, Canada January 6, /8
2 Two-Party Secure Computation Two distrustful parties Alice and Bob wish to compute a joint function f (x, y) of their respective inputs x and y. Alice Bob x y F f (x, y) f (x, y) 1/8
3 Two-Party Secure Computation Two distrustful parties Alice and Bob wish to compute a joint function f (x, y) of their respective inputs x and y. Alice x Bob y. f (x, y) f (x, y) 1/8
4 Impossible Without Assumptions Classically, security is impossible to achieve for most functions f without assumptions. Protocols rely un assumptions: 1 Computational assumptions. 2 Cryptographic primitives. 3 Physical assumptions (e.g. parties are spacially separated). 2/8
5 Impossible Without Assumptions Classically, security is impossible to achieve for most functions f without assumptions. Protocols rely un assumptions: 1 Computational assumptions. 2 Cryptographic primitives. 3 Physical assumptions (e.g. parties are spacially separated). It was long thought that quantum mechanics could be exploited (uncertainty principle, no-cloning, etc.). However, this task is also impossible quantumly [May97]. 2/8
6 Impossible Without Assumptions Classically, security is impossible to achieve for most functions f without assumptions. Protocols rely un assumptions: 1 Computational assumptions. 2 Cryptographic primitives. 3 Physical assumptions (e.g. parties are spacially separated). It was long thought that quantum mechanics could be exploited (uncertainty principle, no-cloning, etc.). However, this task is also impossible quantumly [May97]. Quantum assumptions include: 1 Classical assumptions. 2 Bounded quantum storage. 3 Noisy quantum storage. 2/8
7 Adaptive Versus Non-Adaptive Attacks An adversarial strategy is adaptive if the adversary has access to side-information to tailor its attack, non-adaptive if the adversary has no access to any such information. 3/8
8 Adaptive Versus Non-Adaptive Attacks An adversarial strategy is adaptive if the adversary has access to side-information to tailor its attack, non-adaptive if the adversary has no access to any such information. Having access to k bits of side-information can only increase the adversary s probability of successfuly breaking a protocol by a factor 2 k : P NA succ 1 2 k PA succ P A succ 2 k P NA succ (A-vs-NA) 3/8
9 Quantum Information When the side-information and cryptographic scheme are quantum, the situation is more complicated. Adaptivity is notoriously hard to handle when analysing quantum cryptographic schemes. 4/8
10 Quantum Information When the side-information and cryptographic scheme are quantum, the situation is more complicated. Adaptivity is notoriously hard to handle when analysing quantum cryptographic schemes. 1 Entanglement in not well understood in general. Very sophisticated attacks are possible and difficult to analyze. 2 The quantum equivalent to adaptive attacks are entangled attacks: ρ AB ρ A ρ B. 3 Goal for a quantum A-vs-NA relation: determine how much we have to pay to unentangle ρ AB. 4/8
11 Quantifying the Cost of Unentangling ρ AB The Loewner partial order We say X is positive semi-definite and we write X 0 if all eigenvalues of X are non-negative. This induces a partial order on Hermitian operators: X Y if X Y 0 5/8
12 Quantifying the Cost of Unentangling ρ AB The Loewner partial order We say X is positive semi-definite and we write X 0 if all eigenvalues of X are non-negative. This induces a partial order on Hermitian operators: X Y if X Y 0 A useful property is that for any quantum operation E (incl. measurements), X Y = E(X ) E(Y ) 5/8
13 Quantifying the Cost of Unentangling ρ AB The Loewner partial order (X Y if X Y 0) = E(X ) E(Y ) 5/8
14 Quantifying the Cost of Unentangling ρ AB The Loewner partial order (X Y if X Y 0) = E(X ) E(Y ) We want to find the smallest h such that ρ AB 2 h σ A ρ B for some σ A 5/8
15 Quantifying the Cost of Unentangling ρ AB The Loewner partial order (X Y if X Y 0) = E(X ) E(Y ) We want to find the smallest h such that ρ AB 2 h σ A ρ B for some σ A This implies P A succ 2 h P NA succ 5/8
16 Quantifying the Cost of Unentangling ρ AB The Loewner partial order (X Y if X Y 0) = E(X ) E(Y ) We want to find the smallest h such that ρ AB 2 h σ A ρ B for some σ A This implies P A succ 2 h P NA succ 1 h = I max (B; A) ρ 5/8
17 Quantifying the Cost of Unentangling ρ AB The Loewner partial order (X Y if X Y 0) = E(X ) E(Y ) We want to find the smallest h such that ρ AB 2 h σ A ρ B for some σ A This implies P A succ 2 h P NA succ 1 h = I max (B; A) ρ 2 However, I max (B; A) ρ 2 A in general. 5/8
18 Quantifying the Cost of Unentangling ρ AB The Loewner partial order (X Y if X Y 0) = E(X ) E(Y ) We want to find the smallest h such that ρ AB 2 h σ A ρ B for some σ A This implies P A succ 2 h P NA succ 1 h = I max (B; A) ρ 2 However, I max (B; A) ρ 2 A in general. Our result We show how to recover (and improve) the classical A-vs-NA relation in a general quantum setting. 5/8
19 The Setting ρ AB M A j B N j pass/fail 6/8
20 The Setting ρ AB M A j B N j pass/fail The initial state ρ AB can be thought of as being prepared by Alice or Bob, or the output of a previous protocol, etc. 6/8
21 The Setting ρ AB M A j B N j pass/fail The initial state ρ AB can be thought of as being prepared by Alice or Bob, or the output of a previous protocol, etc. The N j are fixed and kown to Alice. P A succ is Alice s probabilty to pass, maximized over M, P NA succ is obtained by maximizing over j. 6/8
22 Main Result Theorem For P A succ and P NA succ previously defined, P A succ 2 I acc max(b;a) ρ P NA succ 7/8
23 Main Result Theorem For P A succ and P NA succ previously defined, P A succ 2 I acc max(b;a) ρ P NA succ Where I acc max(b; A) ρ is the smallest h such that for any M A J, M I(ρ AB ) = ρ JB 2 h σ J ρ B 7/8
24 Main Result Theorem For P A succ and P NA succ previously defined, P A succ 2 I acc max(b;a) ρ P NA succ Where I acc max(b; A) ρ is the smallest h such that for any M A J, It holds that for any ρ AB, M I(ρ AB ) = ρ JB 2 h σ J ρ B I acc max(b; A) ρ A We thus recover the A-vs-NA relation; P A succ 2 k P NA succ if A holds k qubits. 7/8
25 Quantum Bit-Commitment A bit-commitment scheme is defined in two phases: 1 a commit phase where the sender commits to a classical bit b, and 2 an opening phase where the sender reveals the bit b. 8/8
26 Quantum Bit-Commitment A bit-commitment scheme is defined in two phases: 1 a commit phase where the sender commits to a classical bit b, and 2 an opening phase where the sender reveals the bit b. Bit commitment + QM are complete for two-party cryptography. 8/8
27 Quantum Bit-Commitment A bit-commitment scheme is defined in two phases: 1 a commit phase where the sender commits to a classical bit b, and 2 an opening phase where the sender reveals the bit b. Bit commitment + QM are complete for two-party cryptography. Our result allows us to prove security of bit commitment protocols that were too difficult to analyse before. A BC protocol based on the 1CC primitive (solving an open problem of [FKS + 13]). First security proof of BCJL scheme [BCJL93]. 8/8
28 References G. Brassard, C. Crepeau, R. Jozsa, and D. Langlois. A quantum bit commitment scheme provably unbreakable by both parties. In Proceedings of the 34th Annual IEEE Symposium on the Foundation of Computer Science, pages , Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, and Vassilis Zikas. Feasibility and completeness of cryptographic tasks in the quantum world. In Amit Sahai, editor, Theory of Cryptography, volume 7785 of Lecture Notes in Computer Science, pages Springer Berlin Heidelberg, Dominic Mayers. Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett., 78: , Apr /8
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Feasibility and Completeness of Cryptographic Tasks in the Quantum World Serge Fehr 1, Jonathan Katz 2, Fang Song 3, Hong-Sheng Zhou 2, and Vassilis Zikas 4 1 Centrum Wiskunde & Informatica (CWI), serge.fehr@cwi.nl
More informationQuantum sampling of mixed states
Quantum sampling of mixed states Philippe Lamontagne January 7th Philippe Lamontagne Quantum sampling of mixed states January 7th 1 / 9 The setup Philippe Lamontagne Quantum sampling of mixed states January
More informationActively secure two-party evaluation of any quantum operation
Actively secure two-party evaluation of any quantum operation Frédéric Dupuis ETH Zürich Joint work with Louis Salvail (Université de Montréal) Jesper Buus Nielsen (Aarhus Universitet) August 23, 2012
More informationarxiv: v1 [quant-ph] 3 Jul 2018
Counterfactual Quantum Bit Commitment arxiv:1807.0160v1 [quant-ph] 3 Jul 018 Ya-Qi Song 1,,3, Li Yang 1,,3 1 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese
More informationFang Song. Joint work with Sean Hallgren and Adam Smith. Computer Science and Engineering Penn State University
Fang Song Joint work with Sean Hallgren and Adam Smith Computer Science and Engineering Penn State University Are classical cryptographic protocols secure against quantum attackers? 2 Are classical cryptographic
More informationQuantum Cryptography
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland
More informationarxiv: v7 [quant-ph] 20 Mar 2017
Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationLecture 2: Quantum bit commitment and authentication
QIC 890/891 Selected advanced topics in quantum information Spring 2013 Topic: Topics in quantum cryptography Lecture 2: Quantum bit commitment and authentication Lecturer: Gus Gutoski This lecture is
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationPerfectly secure cipher system.
Perfectly secure cipher system Arindam Mitra Lakurdhi, Tikarhat Road, Burdwan 713102 India Abstract We present a perfectly secure cipher system based on the concept of fake bits which has never been used
More informationQuantum Technologies for Cryptography
University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationLecture: Quantum Information
Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers
More informationAttacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
entropy Article Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Michel Boyer, Rotem Liss, * and Tal Mor Département d Informatique et de Recherche Opérationnelle
More informationEntropy Accumulation in Device-independent Protocols
Entropy Accumulation in Device-independent Protocols QIP17 Seattle January 19, 2017 arxiv: 1607.01796 & 1607.01797 Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick Outline
More informationarxiv:quant-ph/ v1 10 Dec 1997
A brief review on the impossibility of quantum bit commitment Gilles Brassard Claude Crépeau Université de Montréal December 10, 1997 Dominic Mayers Princeton University Louis Salvail BRICS arxiv:quant-ph/9712023v1
More informationBit-Commitment and Coin Flipping in a Device-Independent Setting
Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).
More informationQuantum Cryptography. Chris1an Schaffner. Research Center for Quantum So8ware
Quantum Cryptography Chris1an Schaffner Research Center for Quantum So8ware Ins1tute for Logic, Language and Computa1on (ILLC) University of Amsterdam Centrum Wiskunde & Informa1ca Physics@FOM, Veldhoven
More informationOptimal bounds for quantum bit commitment
Optimal bounds for quantum bit commitment André Chailloux LRI Université Paris-Sud andre.chailloux@gmail.fr Iordanis Kerenidis CNRS - LIAFA Université Paris 7 jkeren@liafa.jussieu.fr 1 Introduction Quantum
More informationIntroduction to Quantum Cryptography
Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationWhy quantum bit commitment and ideal quantum coin tossing are impossible.
Why quantum bit commitment and ideal quantum coin tossing are impossible. Hoi-Kwong Lo 1 andh.f.chau 2 School of Natural Sciences, Institute for Advanced Study, Princeton, NJ 08540 There had been well
More informationCryptography In the Bounded Quantum-Storage Model
Cryptography In the Bounded Quantum-Storage Model Ivan B. Damgård Serge Fehr Louis Salvail Christian Schaffner August 30, 005 Abstract We initiate the study of two-party cryptographic primitives with unconditional
More informationPractical Quantum Coin Flipping
Practical Quantum Coin Flipping Anna Pappa, 1, André Chaillloux, 2, Eleni Diamanti, 1, and Iordanis Kerenidis 2, 1 LTCI, CNRS - Télécom ParisTech, Paris, France 2 LIAFA, CNRS - Université Paris 7, Paris,
More informationPERFECTLY secure key agreement has been studied recently
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract
More informationTechnical Report Communicating Secret Information Without Secret Messages
Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,
More informationAn Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009
An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer
More informationOther Topics in Quantum Information
p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.
More informationarxiv:cs/ v2 [cs.cr] 16 Apr 2004
Quantum m-out-of-n Oblivious Transfer Zhide Chen, Hong Zhu Department of Computer Science, Fudan University, Shanghai 00433, P.R.China. arxiv:cs/0311039v [cs.cr] 16 Apr 004 Key Laboratory of Intelligent
More informationDevice-Independent Quantum Information Processing
Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information
More informationarxiv: v4 [quant-ph] 25 Oct 2011
Unconditionally Secure Bit Commitment with Flying Qudits arxiv:1101.4620v4 [quant-ph] 25 Oct 2011 Adrian Kent 1, 2 1 Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences,
More informationOptimal quantum strong coin flipping
Optimal quantum strong coin flipping André Chailloux LRI Université Paris-Sud andre.chailloux@lri.fr Iordanis Kerenidis CNRS - LRI Université Paris-Sud jkeren@lri.fr April, 009 Abstract Coin flipping is
More informationTransmitting and Hiding Quantum Information
2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,
More informationRealization of B92 QKD protocol using id3100 Clavis 2 system
Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationBound entangled states with secret key and their classical counterpart
Bound entangled states with secret key and their classical counterpart Māris Ozols Graeme Smith John Smolin February 6, 2014 A brief summary Main result A new construction of bound entangled states with
More informationarxiv: v2 [quant-ph] 10 Oct 2012
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation arxiv:1201.0849v2 [quant-ph] 10 Oct 2012 Harry Buhrman, 1 Matthias Christandl, 2 and Christian Schaffner 1 1 University of Amsterdam
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More informationarxiv:quant-ph/ v2 3 Oct 2000
Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping
More informationQUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University
QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing
More informationQuantum Information Processing and Diagrams of States
Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationDevice-Independent Quantum Information Processing (DIQIP)
Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,
More informationQuantum Teleportation
Fortschr. Phys. 50 (2002) 5 7, 608 613 Quantum Teleportation Samuel L. Braunstein Informatics, Bangor University, Bangor LL57 1UT, UK schmuel@sees.bangor.ac.uk Abstract Given a single copy of an unknown
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationAsymptotic Analysis of a Three State Quantum Cryptographic Protocol
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key
More informationQuantum Teleportation Pt. 3
Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationUnconditionally secure deviceindependent
Unconditionally secure deviceindependent quantum key distribution with only two devices Roger Colbeck (ETH Zurich) Based on joint work with Jon Barrett and Adrian Kent Physical Review A 86, 062326 (2012)
More informationPractical and Provably-Secure Commitment Schemes from Collision-Free Hashing
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing Shai Halevi Silvio Micali MIT Laboratory for Computer Science, 545 Technology Square, Cambridge, MA 02139 Abstract. We present
More informationReport on Conceptual Foundations and Foils for QIP at the Perimeter Institute, May 9 May
Report on Conceptual Foundations and Foils for QIP at the Perimeter Institute, May 9 May 13 2011 Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. May 19, 2011
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationQuantum dice rolling
Quantum dice rolling N. Aharon and J. Silman School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978, Israel A coin is just a two sided dice. Recently, Mochon proved that quantum weak coin
More informationBell inequality for qunits with binary measurements
Bell inequality for qunits with binary measurements arxiv:quant-ph/0204122v1 21 Apr 2002 H. Bechmann-Pasquinucci and N. Gisin Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland
More informationGilles Brassard. Université de Montréal
Gilles Brassard Université de Montréal Gilles Brassard Université de Montréal VOLUME 76, NUMBER 5 P H Y S I C A L R E V I E W L E T T E R S 29 JANUARY 1996 Purification of Noisy Entanglement and Faithful
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationQuantum Cryptography
Quantum Cryptography Gilles Brassard and Claude Crépeau 1 Quantum Cryptography [A] Quantum Cryptography was born in the early seventies when Stephen Wiesner wrote Conjugate Coding, which unfortunately
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationRandomness in nonlocal games between mistrustful players
Randomness in nonlocal games between mistrustful players Carl A. Miller and Yaoyun Shi* Source paper: Forcing classical behavior for quantum players by C. Miller and Y. Shi (2016), attached. One of the
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationarxiv:quant-ph/ v1 27 Dec 2004
Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,
More informationquantum distribution of a sudoku key Sian K. Jones University of South Wales
Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More information10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.
10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. Clifton, Bub, Halvorson (2003) Motivation: Can quantum physics be reduced to information-theoretic principles? CBH Theorem:
More informationComposing Quantum Protocols in a Classical Environment
Composing Quantum Protocols in a Classical Environment Serge Fehr and Christian Schaffner Centrum Wiskunde & Informatica (CWI) Amsterdam, The Netherlands {S.Fehr,C.Schaffner}@cwi.nl Abstract. We propose
More informationarxiv: v3 [quant-ph] 17 Dec 2018
Unconstrained Summoning for relativistic quantum information processing Adrian Kent Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce
More informationQuantum-Secure Coin-Flipping and Applications
Quantum-Secure Coin-Flipping and Applications Ivan Damgård and Carolin Lunemann DAIMI, Aarhus University, Denmark {ivan carolin}@cs.au.dk Abstract. In this paper, we prove classical coin-flipping secure
More informationClassical and Quantum Strategies for Two-Prover Bit Commitments
Classical and Quantum Strategies for Two-Prover Bit Commitments Claude Crépeau 1, Louis Salvail 2, Jean-Raymond Simard 1, and Alain Tapp 3 1 School of Computer Science, McGill University, Montréal, QC,
More informationCryptanalysis of a Knapsack Based Two-Lock Cryptosystem
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem Bin Zhang 1,2, Hongjun Wu 1, Dengguo Feng 2, and Feng Bao 1 1 Institute for Infocomm Research, Singapore 119613 2 State Key Laboratory of Information
More informationQuantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it
More informationChallenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley
Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying
More informationA Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State
Commun. Theor. Phys. 70 (018) 43 48 Vol. 70, No. 1, July 1, 018 A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State Xu-Feng Niu ( 牛旭峰 ), 1 Jian-Zhong Zhang ( 张建中 ),
More informationLecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics
0368.4162: Introduction to Cryptography Ran Canetti Lecture 11 12th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics Introduction to cryptographic protocols Commitments 1 Cryptographic
More informationUniversity of Amsterdam
University of Amsterdam MSc Computational Science arxiv:1510.07118v1 [quant-ph] 24 Oct 2015 Master Thesis Secure Identification in the Isolated Qubits Model Supervisor: Dr. Christian Schaffner by Filippos-Arthouros
More informationProblems of the CASCADE Protocol and Renyi Entropy Reduction in Classical and Quantum Key Generation
arxiv:quant-ph/0703012v1 1 Mar 2007 Problems of the CASCADE Protocol and Renyi Entropy Reduction in Classical and Quantum Key Generation Koichi Yamazaki 1,2, Ranjith Nair 2, and Horace P. Yuen 2 1 Department
More informationSecret-Key Agreement over Unauthenticated Public Channels Part I: Definitions and a Completeness Result
Secret-Key Agreement over Unauthenticated Public Channels Part I: Definitions and a Completeness Result Ueli Maurer, Fellow, IEEE Stefan Wolf Abstract This is the first part of a three-part paper on secret-key
More informationASPECIAL case of the general key agreement scenario defined
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 4, APRIL 2003 839 Secret-Key Agreement Over Unauthenticated Public Channels Part III: Privacy Amplification Ueli Maurer, Fellow, IEEE, and Stefan Wolf
More informationarxiv:quant-ph/ May 2002
Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of
More informationPractical Quantum Coin Flipping
Practical Quantum Coin Flipping Anna Pappa, Andre Chailloux, Eleni Diamanti, Iordanis Kerenidis To cite this version: Anna Pappa, Andre Chailloux, Eleni Diamanti, Iordanis Kerenidis. Practical Quantum
More informationQuantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií
České vysoké učení technické v Praze Fakulta informačních technologií Katedra teoretické informatiky Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-MVI Methods of Computational Intelligence(2010/2011)
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationError Reconciliation in QKD. Distribution
Error Reconciliation in Quantum Key Distribution Richard P. Brent MSI, ANU 1 October 2009 Abstract The problem of "error reconciliation" arises in Quantum Cryptography, which is more accurately described
More informationUniversal Single Server Blind Quantum Computation Revisited
Universal Single Server Blind Quantum Computation Revisited Durgesh Pandey durgesh.pandey@research.iiit.ac.in Aditya Jain aditya.jain@research.iiit.ac.in ABSTRACT In this paper, we present an improvised
More informationLecture 11: Key Agreement
Introduction to Cryptography 02/22/2018 Lecture 11: Key Agreement Instructor: Vipul Goyal Scribe: Francisco Maturana 1 Hardness Assumptions In order to prove the security of cryptographic primitives, we
More informationCS120, Quantum Cryptography, Fall 2016
CS10, Quantum Cryptography, Fall 016 Homework # due: 10:9AM, October 18th, 016 Ground rules: Your homework should be submitted to the marked bins that will be by Annenberg 41. Please format your solutions
More informationHigh Fidelity to Low Weight. Daniel Gottesman Perimeter Institute
High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,
More informationNew Notions of Security: Universal Composability without Trusted Setup
New Notions of Security: Universal Composability without Trusted Setup Manoj Prabhakaran & Amit Sahai Princeton University To appear in STOC 04 Defining Security Central Problem in Cryptography Understanding
More informationAQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013
AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 Lecturer: Dr. Mark Tame Introduction With the emergence of new types of information, in this case
More informationSquashed entanglement
Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication
More informationQuantum Cryptography : On the Security of the BB84 Key-Exchange Protocol
Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol Thomas Baignères EPFL - LASEC thomas.baigneres@epfl.ch Abstract. In 984, C.H. Bennet and G. Brassard proposed a new protocol aimed
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationWhat are we talking about when we talk about post-quantum cryptography?
PQC Asia Forum Seoul, 2016 What are we talking about when we talk about post-quantum cryptography? Fang Song Portland State University PQC Asia Forum Seoul, 2016 A personal view on postquantum cryptography
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 3: Basic Quantum Mechanics 26th September 2016 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information
More informationEntanglement Measures and Monotones
Entanglement Measures and Monotones PHYS 500 - Southern Illinois University March 30, 2017 PHYS 500 - Southern Illinois University Entanglement Measures and Monotones March 30, 2017 1 / 11 Quantifying
More informationPhysically Uncloneable Functions in the Universal Composition Framework. Christina Brzuska Marc Fischlin Heike Schröder Stefan Katzenbeisser
Physically Uncloneable Functions in the Universal Composition Framework Marc Fischlin Heike Schröder Stefan Katzenbeisser Security of s Optical Arbiter Coating Many other s bounded noise physically uncloneable
More information