Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Christian Majenz"'
Publikováno v:
Quantum, Vol 8, p 1330 (2024)
Copy-protection allows a software distributor to encode a program in such a way that it can be evaluated on any input, yet it cannot be "pirated" – a notion that is impossible to achieve in a classical setting. Aaronson (CCC 2009) initiated the for
Externí odkaz:
https://doaj.org/article/d6dbe3c1f9024125ae3d2a241a50c07b
Publikováno v:
Quantum, Vol 5, p 603 (2021)
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In thi
Externí odkaz:
https://doaj.org/article/1302f393c6bd4086a8667ef59f972352
Autor:
Cécilia Lancien, Christian Majenz
Publikováno v:
Quantum, Vol 4, p 313 (2020)
Unitary $t$-designs are the bread and butter of quantum information theory and beyond. An important issue in practice is that of efficiently constructing good approximations of such unitary $t$-designs. Building on results by Aubrun (Comm. Math. Phys
Externí odkaz:
https://doaj.org/article/599d93ea3e394e98ac54e6fc38c65ecc
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229718
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0600da4979a7cb189318ffa7560ba47d
https://doi.org/10.1007/978-3-031-22972-5_15
https://doi.org/10.1007/978-3-031-22972-5_15
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031070815
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4732205a2c84a47807cd5179bb88828a
https://doi.org/10.1007/978-3-031-07082-2_17
https://doi.org/10.1007/978-3-031-07082-2_17
Autor:
Christian Majenz, Cécilia Lancien
Publikováno v:
Quantum
Quantum, 2020, ⟨10.22331/q-2020-08-28-313⟩
Quantum, Verein, 2020, ⟨10.22331/q-2020-08-28-313⟩
Quantum, 4
Quantum, Vol 4, p 313 (2020)
Quantum, 2020, ⟨10.22331/q-2020-08-28-313⟩
Quantum, Verein, 2020, ⟨10.22331/q-2020-08-28-313⟩
Quantum, 4
Quantum, Vol 4, p 313 (2020)
Unitary $t$-designs are the bread and butter of quantum information theory and beyond. An important issue in practice is that of efficiently constructing good approximations of such unitary $t$-designs. Building on results by Aubrun (Comm. Math. Phys
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e7aae5da81be512b93691d4a312ca2f7
https://hal.science/hal-03024389
https://hal.science/hal-03024389
Publikováno v:
Quantum, 5, 603.1-603.38
Quantum, Vol 5, p 603 (2021)
Quantum, Vol 5, p 603 (2021)
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::59bff82e4624b5c978a0f48f93a994af
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266
EUROCRYPT (3)
EUROCRYPT (3)
Formulating and designing authentication of classical messages in the presence of adversaries with quantum query access has been a longstanding challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e45d14bff5850f2374985f68d592ee55
https://doi.org/10.1007/978-3-030-45727-3_27
https://doi.org/10.1007/978-3-030-45727-3_27
Publikováno v:
Advances in Cryptology – CRYPTO 2020 ISBN: 9783030568764
CRYPTO (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2020
Advances in Cryptology – CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III
CRYPTO (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2020
Advances in Cryptology – CRYPTO 2020-40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III
We revisit recent works by Don, Fehr, Majenz and Schaffner and by Liu and Zhandry on the security of the Fiat-Shamir transformation of $\Sigma$-protocols in the quantum random oracle model (QROM). Two natural questions that arise in this context are:
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c6368ae147d0ac6b9634e687c27055be
https://doi.org/10.1007/978-3-030-56877-1_21
https://doi.org/10.1007/978-3-030-56877-1_21
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266
We consider the problem of efficiently simulating random quantum states and random unitary operators, in a manner which is convincing to unbounded adversaries with black-box oracle access. This problem has previously only been considered for restrict
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9c9473ae0e27a49207799c3ccbc490ff