Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Christopher Portmann"'
Publikováno v:
New Journal of Physics, Vol 21, Iss 4, p 043057 (2019)
Relativistic protocols have been proposed to overcome certain impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the signalling limit given by the speed of l
Externí odkaz:
https://doaj.org/article/8f607efbb4034ef4b52fbc5e90a1bdb1
Publikováno v:
Physical Review X, Vol 3, Iss 3, p 031006 (2013)
Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a Bell’s inequality between two parties, Alice and Bob, who are connected by a quantum channel. However, in reality, quantum channels are lossy and cu
Externí odkaz:
https://doaj.org/article/7e3158b94048446ebfbad71efba57ff4
Autor:
Christopher Portmann, Renato Renner
Publikováno v:
Reviews of Modern Physics, 94 (2)
Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic re
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031070846
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::82cd73ad76300fcd5d5ff0b35ec9c63d
https://doi.org/10.1007/978-3-031-07085-3_22
https://doi.org/10.1007/978-3-031-07085-3_22
Publikováno v:
Public-Key Cryptography – PKC 2021 ISBN: 9783030752477
Public Key Cryptography (2)
Public Key Cryptography (2)
This paper takes a fresh approach to systematically characterizing, comparing, and understanding CCA-type security definitions for public-key encryption (PKE), a topic with a long history. The justification for a concrete security definition X is rel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5d9e6e705fc8e5cf521a71e71c5ff785
https://doi.org/10.1007/978-3-030-75248-4_7
https://doi.org/10.1007/978-3-030-75248-4_7
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920777
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::46b500126cbbcdb159d3099fed7638bc
https://doi.org/10.1007/978-3-030-92078-4_7
https://doi.org/10.1007/978-3-030-92078-4_7
Publikováno v:
Theoretical Computer Science, 747
We propose the concept of a system algebra with a parallel composition operation and an interface connection operation, and formalize composition-order invariance, which postulates that the order of composing and connecting systems is irrelevant, a g
Publikováno v:
New Journal of Physics, 21
New Journal of Physics
New Journal of Physics
Relativistic protocols have been proposed to overcome certain impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the signalling limit given by the speed of l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::23010267ac68ac7fa6777b160722275d
https://hdl.handle.net/20.500.11850/342946
https://hdl.handle.net/20.500.11850/342946
Publikováno v:
Theory of Cryptography ISBN: 9783030360290
Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, game-based, and not known
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac322c9ff8285fa264b398fdb1394543
https://doi.org/10.1007/978-3-030-36030-6_12
https://doi.org/10.1007/978-3-030-36030-6_12
Autor:
Christopher Portmann
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319566160
EUROCRYPT (3)
EUROCRYPT (3)
We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7f6eaba2a06c6b1b1ea7262a5e3f0916
https://doi.org/10.1007/978-3-319-56617-7_12
https://doi.org/10.1007/978-3-319-56617-7_12