Abstract. We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quantum 1-out-of-2 Oblivious Transfer and quantum Bit Commitment are presented and the uncertainty relation is used to prove the security of these protocols in the bounded-quantum-storage model according to new strong security definitions. As another application, we consider the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers. The uncertainty relation allows to prove the security of QKD protocols in this setting while tolerating considerably higher error rates compared to the standard model with unbounded adver...
We present full generalizations of entropic security and entropic indistinguishability, notions intr...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Abstract. We derive a new entropic quantum uncertainty relation involving min-entropy. The relation ...
Abstract. We derive a new entropic quantum uncertainty relation in-volving min-entropy. The relation...
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight a...
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On ...
Entropic uncertainty relations are quantitative characterizations of Heisenberg’s uncertainty princi...
Uncertainty relations lie at the very core of quantum mechanics, and form the cornerstone of essenti...
Apart from their foundational significance, entropic uncertainty relations play a central role in pr...
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret strin...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most...
Heisenberg's uncertainty principle forms a fundamental element of quantum mechanics. Uncertainty rel...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
We present full generalizations of entropic security and entropic indistinguishability, notions intr...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Abstract. We derive a new entropic quantum uncertainty relation involving min-entropy. The relation ...
Abstract. We derive a new entropic quantum uncertainty relation in-volving min-entropy. The relation...
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight a...
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On ...
Entropic uncertainty relations are quantitative characterizations of Heisenberg’s uncertainty princi...
Uncertainty relations lie at the very core of quantum mechanics, and form the cornerstone of essenti...
Apart from their foundational significance, entropic uncertainty relations play a central role in pr...
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret strin...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most...
Heisenberg's uncertainty principle forms a fundamental element of quantum mechanics. Uncertainty rel...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming t...
We present full generalizations of entropic security and entropic indistinguishability, notions intr...
We initiate the study of two-party cryptographic primitives with unconditional security, assuming th...
International audienceIn this work we present a security analysis for quantum key distribution, esta...